OpenPass
Health Uyari
- License รขโฌโ License: MIT
- Description รขโฌโ Repository has a description
- Active repo รขโฌโ Last push 0 days ago
- Low visibility รขโฌโ Only 8 GitHub stars
Code Basarisiz
- rm -rf รขโฌโ Recursive force deletion command in .github/workflows/ci.yml
- rm -rf รขโฌโ Recursive force deletion command in .github/workflows/release.yml
Permissions Gecti
- Permissions รขโฌโ No dangerous permissions requested
Bu listing icin henuz AI raporu yok.
๐ The password manager for terminal users and AI agents. Age-encrypted, keyring-cached, MCP-ready. Zero telemetry.
OpenPass

A modern, secure command-line password manager written in Go. Uses age for encryption with built-in MCP server support for AI agent integration.

Safety Notice: OpenPass manages sensitive secrets. Use at your own risk, keep tested backups of your vault, and verify recovery before relying on it for critical credentials.
Features
- Modern Encryption: age (X25519 + ChaCha20-Poly1305)
- TOTP Support: Store and generate TOTP codes
- Clipboard Auto-Clear: Automatic clearing after timeout
- Autotype: Cross-platform automatic password entry (macOS, Linux, Windows)
- Secret Execution: Run commands with vault secrets injected as environment variables
- Session Caching: OS keyring with 15-minute TTL
- Git Integration: Automatic commits and sync
- Multi-User Vaults: age recipients for shared access
- MCP Server: stdio and HTTP for AI agent integration with scoped token management
- MCP Slash Commands:
add-credential,rotate-credential,find-and-use,share-credentialโ guided workflows surfaced as slash commands in Claude Code, OpenCode, Hermes - Native Secure-Input Dialog: cross-platform popups (macOS osascript, Linux zenity/kdialog, Windows Get-Credential) for collecting credentials from agents without exposing them in chat
- Cross-Platform: macOS, Linux, Windows, FreeBSD
Installation
Quick install
macOS / Linux:
curl -sSfL https://raw.githubusercontent.com/danieljustus/OpenPass/main/scripts/install.sh | sh
Windows:
irm https://raw.githubusercontent.com/danieljustus/OpenPass/main/scripts/install.ps1 | iex
Homebrew:
brew tap danieljustus/tap
brew install openpass
Scoop:
scoop bucket add openpass https://github.com/danieljustus/scoop-bucket
scoop install openpass
Go:
go install github.com/danieljustus/OpenPass@latest
For manual downloads, Linux packages, release verification, and build-from-source instructions, see docs/distribution.md.
| Platform | amd64 | arm64 | Install Methods |
|---|---|---|---|
| macOS | โ | โ | Quick install, Homebrew, Go, Manual |
| Linux | โ | โ | Quick install, Homebrew, Go, Manual, deb/rpm/apk |
| Windows | โ | โ | Quick install, Scoop, Go, Manual |
| FreeBSD | โ | โ | Go, Manual |
Quick Start
# Initialize vault
openpass init
# Add a password
openpass add github
# or non-interactive:
openpass set github.password --value "mysecretpassword"
# Add TOTP metadata
openpass add github --totp-secret JBSWY3DPEHPK3PXP --totp-issuer GitHub
# Retrieve (auto-copies to clipboard with 45s timeout)
openpass get github.password --clip
# Autotype password into focused application (macOS/Linux/Windows)
openpass get github.password --autotype
# Show entry details, including the current TOTP code when configured
openpass get github
# List and search
openpass list
openpass find mybank
# Generate secure passwords
openpass generate --length 32 --symbols
openpass generate --store newaccount.password --length 20 --symbols
# Session management
openpass unlock # cache passphrase
openpass lock # clear cache
openpass auth status
openpass auth set touchid # macOS Touch ID unlock
openpass auth set passphrase # passphrase-only unlock
# Recipients for multi-user vaults
openpass recipients list
openpass recipients add age1...
# Git sync
openpass git pull
openpass git push
# Secret execution (injects vault secrets as env vars)
openpass run --env API_KEY=api.kimi-key -- curl -H "Authorization: Bearer $API_KEY" https://api.example.com
# Backup/Restore
openpass backup ~/backups/openpass-$(date +%Y%m%d).tar.gz
openpass restore ~/backups/openpass-20260427.tar.gz
Backup archives contain encrypted vault files, identity material, config, and MCP tokens. Protect them like the vault itself and test restore before relying on backups.
Migration from other managers
OpenPass can import from 1Password, Bitwarden, pass, and CSV exports:
openpass import <format> <source>
openpass import bitwarden ~/exports/bitwarden.json
openpass import pass ~/.password-store
See docs/migration.md for export steps, format details, and verification guidance.
MCP Server
OpenPass exposes an MCP server for AI agent integration:

# Stdio mode (recommended for local agents)
openpass serve --stdio --agent claude-code
# HTTP mode
openpass serve --port 8080
Use openpass mcp-config to generate ready-to-paste client config:
openpass mcp-config claude-code
openpass mcp-config claude-code --http
openpass mcp-config hermes --http --format hermes
HTTP mode binds to 127.0.0.1 by default and uses bearer token authentication. Agents can use the MCP generate_totp tool to get current TOTP codes without receiving the stored TOTP secret.
Scoped Token Management (v2.2.0+): Create fine-grained access tokens for agents:
openpass mcp token create --agent hermes --tools list_entries,get_entry --expires 24h
openpass mcp token list
openpass mcp token revoke <token-id>
For detailed agent setup, profiles, token management, and observability, see docs/agent-integration.md.
Configuration
Global config: ~/.openpass/config.yaml. See config.yaml.example for a commented starting point.
For the full configuration reference, see docs/configuration.md.
Environment Variables
OPENPASS_VAULTโ Path to vault directory (default:~/.openpass)
Vault Structure
~/.openpass/
โโโ identity.age # Encrypted age identity
โโโ config.yaml # Vault configuration
โโโ mcp-token # Bearer token for HTTP MCP
โโโ entries/ # Encrypted password entries
โ โโโ github.age
โ โโโ work/
โ โโโ aws.age
โโโ .git/ # Git repository
Security
- age encryption: X25519 + ChaCha20-Poly1305
- Passphrase never stored in plain text
- Session caching via OS keyring (15-minute TTL)
- Each entry individually encrypted
- Git history contains only ciphertext
- HTTP MCP bound to
127.0.0.1with bearer token auth - No telemetry (see SECURITY.md)
Documentation
- Configuration reference
- Agent integration
- MCP API
- Distribution channels
- Troubleshooting
- Architecture
- Security policy
Comparison
Last updated: May 2026. Features, pricing, and availability are subject to change. Please verify all details on the respective product's official website before making decisions.
Disclaimer: All product names, logos, and brands referenced in this comparison are trademarks or registered trademarks of their respective owners. Use of these names is for identification and informational purposes only and does not imply endorsement, affiliation, or sponsorship. The information in this comparison is provided "as is" without warranty of any kind.
| Feature | OpenPass | 1Password | Bitwarden | pass (zx2c4) | Sharing with AI Agents in Chat |
|---|---|---|---|---|---|
| Encryption | age (X25519 + ChaCha20-Poly1305) | AES-256 | AES-256 | GPG | None (plaintext) |
| Primary Interface | Terminal-first | GUI-first (CLI available) | GUI-first (CLI available) | Terminal-only | Chat interface |
| AI Integration | MCP server (stdio + HTTP) with scoped tokens | Agentic Autofill, SDKs for AI agents | MCP server, Agent Access SDK | No AI integration | Paste secrets into prompts |
| Pricing | Free (MIT) | Subscription ($47.88/yr Individual) | Freemium / Subscription ($19.80/yr Premium) | Free (GPL) | Free (but risky) |
| Sync | Git (built-in) | Cloud (1Password servers) | Cloud (Bitwarden servers) or self-host | Git (automatic commits) | Manual copy-paste |
| Self-hosting | Full control (local vault + git) | Partial (Connect Server, SCIM Bridge) | Yes (official Docker/K8s or Vaultwarden) | Full control | N/A |
| Open Source | Yes (MIT) | Partial (SDKs open, core proprietary) | Mostly (core GPL/AGPL, Enterprise Bitwarden License) | Yes (GPLv2+) | N/A |
| TOTP | Built-in | Built-in | Premium feature | Extension only | Manual entry |
| Autotype | Built-in (cross-platform) | Built-in (Windows Auto-Type, macOS Universal Autofill) | Browser autofill only (desktop autotype in development) | No built-in | Manual entry |
| Secret Execution | Built-in (openpass run) |
Built-in (op run) |
Built-in (bws run) |
No built-in | Not applicable |
| Session Caching | OS keyring (15m TTL) | Biometric unlock, Magic Unlock, SSO | Biometric unlock, PIN, BW_SESSION token |
gpg-agent | None |
| Git Integration | Built-in | SSH agent, commit signing | SSH agent, GitHub Actions, GitLab CI | Built-in (automatic commits) | No |
| MCP Server | Built-in (stdio + HTTP) | Community (official: no raw secrets via MCP) | Official (bitwarden-mcp) |
No | No |
| Password Generation | Built-in | Built-in | Built-in | Built-in | Manual / ad-hoc |
| Cross-Platform | macOS, Linux, Windows, FreeBSD | macOS, Linux, Windows, mobile | macOS, Linux, Windows, mobile, web | Unix-like (Linux, macOS, FreeBSD) | Any chat platform |
| Telemetry | None | Opt-in (personal), on-by-default (business) | Administrative data only (vault zero-knowledge) | None | Logged by chat providers |
| Entry Format | Individual encrypted files | Proprietary database (1PUX export documented) | Encrypted JSON / SQLite | Individual encrypted files | Plaintext in chat history |
OpenPass differentiators:
- Terminal-native: Designed for keyboard-driven workflows without GUI dependency
- Modern encryption: age instead of GPG โ simpler key management, no web of trust
- MCP-ready: Native AI agent integration via Model Context Protocol with scoped tokens and audit logging
- Zero telemetry: No analytics, no cloud dependency, no account required
- Built-in utilities: TOTP, autotype, secret execution, and password generation without external tools
- Git-native: Automatic sync with full version history of encrypted entries
Security note on AI agent chat sharing: Pasting passwords into chat interfaces exposes secrets in plaintext chat history, model training logs, and provider databases. Unlike OpenPass's MCP integration โ which keeps credentials encrypted and uses scoped tokens with audit logging โ chat sharing provides no access control, rotation, or revocation capabilities.
Dependencies
- Go 1.26.3 or later
- filippo.io/age โ encryption
- spf13/cobra โ CLI framework
- zalando/go-keyring โ OS keyring
Contributing
See CONTRIBUTING.md for development setup and PR process.
Testing
# Run all tests with race detector (recommended for local validation)
make test
# Run tests without race detector (faster, for quick iteration)
make test-fast
# Run specific package tests
go test ./internal/vault/... -v
Tests include the Go race detector by default via make test to catch concurrency issues early. Use make test-fast when iterating quickly and you want a faster feedback loop without the race detector penalty.
Some tests are skipped automatically:
- Slow tests (
-shortflag): Flow and binary e2e tests skip in short mode. Run without-shortto execute them. - Headless CI: Tests requiring the OS keyring (session caching) skip when no keyring backend is available (e.g., containerized or headless CI). These are environment-dependent and not failures.
License
MIT License
Acknowledgments
- Inspired by pass from zx2c4
- MCP support via mark3labs/mcp-go
Disclaimer
Use at your own risk. Always keep tested backups of your vault.
Yorumlar (0)
Yorum birakmak icin giris yap.
Yorum birakSonuc bulunamadi