- Make it possible to sign up to a mailing list to be notified of updates
- Add note field to credentials (userful when you have several accounts on the same service)
- Improve readme
- try icloud db storage
- Show first 4 in payment card list
- Make sure first usage asks for configuration values to be stored in the config file
- Show service field with only 30 first characters
- Sanitize all input to be stored (to remove all characters not allowed in Keepass XML)
- Show dates for each entry
- Editing of entries
- Add an option to pass master password from the command line
- Option to output JSON, for scripting
- remove anyhow?
- add TOTP support
- first time vault creation
- invalid password error message
- OTP support
With JSON output, following could be done.
NOT: make sure you have unlocked the vault before running these commands. Alternatively, you can use the ---master-pwd
flag to provide the password.
- Integrate with other security tools:
# Get password and pipe it to a security analysis tool
passlane show alma --json | jq -r '.credentials[0].password' | password-strength-checker
# Bulk check all passwords
passlane list --json | jq -r '.credentials[].password' | password-strength-checker --bulk
- Automated password rotation:
# Script to rotate passwords for all services
passlane list --json | jq -r '.credentials[] | .service + " " + .username' | while read service username; do
new_password=$(generate-strong-password)
update-service-password "$service" "$username" "$new_password"
passlane update "$service" --username "$username" --password "$new_password"
done
- Export to other password managers:
# Convert to 1Password format
passlane list --json | jq '
.credentials[] | {
title: .service,
username: .username,
password: .password,
type: "login"
}
' > 1password_import.json
- Create custom reports:
# Find services using the same password
passlane list --json | jq -r '
.credentials | group_by(.password) |
map(select(length > 1) | map(.service)) |
.[] | @csv
' | column -t -s, -n
- Automate login processes:
# Use with Selenium for automated testing
SERVICE="https://example.com"
CREDS=$(passlane show "$SERVICE" --json)
USERNAME=$(echo "$CREDS" | jq -r '.credentials[0].username')
PASSWORD=$(echo "$CREDS" | jq -r '.credentials[0].password')
python <<EOF
from selenium import webdriver
driver = webdriver.Chrome()
driver.get("$SERVICE")
driver.find_element_by_id("username").send_keys("$USERNAME")
driver.find_element_by_id("password").send_keys("$PASSWORD")
driver.find_element_by_id("login").click()
EOF
- Sync with cloud services:
# Sync passwords to a secure cloud storage
passlane list --json | jq -c '.credentials[]' | while read -r cred; do
service=$(echo "$cred" | jq -r '.service')
echo "$cred" | aws s3 cp - "s3://secure-bucket/passwords/$service.json"
done
- Generate simple statistics:
# Count passwords by length
passlane list --json | jq -r '
.credentials | map(.password | length) |
group_by(.) | map({length: .[0], count: length}) |
sort_by(.length)[] | [.length, .count] | @tsv
' | column -t
- Create a simple API:
# Run a simple API server
passlane list --json > /tmp/passwords.json
python -m http.server 8000 &
curl http://localhost:8000/passwords.json | jq '.credentials[] | select(.service == "example.com")'