CLI utility to check Bitwarden credentials for security gaps.
- Check passwords were exposed in data breach using Have I Been Pwned service.
- Report on reused passwords
- Report URLs associated with credentials not using HTTPS
Doesn't store or send credentials anywhere.
Uses hash snippets to check breaches using k-anonymity model. Read more on Troy
Hunt blog
here
- Bitwarden CLI (Installed and logged in)
- Deno Runtime (Installed)
- Have I Been Pwned API (No action by user)
deno task compile
# Run on windows
.\dist\windows\locksmith.exe --help
# Run on linux
./dist/linux/locksmith --help
# Run on Mac OS (untested)
./dist/macos/locksmith --help
Locksmith depends on Bitwarden CLI. Install, login and start a session.
-
Login Log in with your email:
bw login <your-email>
-
Unlock & Session Retrieve a session key by unlocking:
bw unlock
Once unlocked, export the session key:
# linux/maxos export BW_SESSION=<your-session-key> # windows $env:BW_SESSION=<your-session-key>
Locksmith CLI provides the following commands:
# match tag to vertion.ts
git tag -a v1.0.0 -m "Release description"
git push origin v1.0.0
- Lock Bitwarden session when finished:
bw lock
Open issues or draft PRs to discuss new features & fixes.
Other Password Managers.