You can't do that directly, but a simple shell script[0] 'll do the
trick. There's also pass-audit[1], which might be better suited. It
checks your password-store against haveibeenpwned.com's password list
and also evaluates the complexity using Dropbox' zxcvbn password
strength estimator. (I've contributed the zxcvbn part to pass-audit, so
call me biased :-) )
[0]:
find ~/.password-store/ -name '*.gpg' |
while read PWFILE; do
PWFILE=${PWFILE#`realpath ~/.password-store`/}
echo ${PWFILE%.gpg}:`pass ${PWFILE%.gpg} | head -n1`
done | column -t -s:
[1]: https://github.com/roddhjav/pass-audit/
On Thu, May 24, 2018 at 05:10:17AM -0700, [email protected] wrote:
> Hello,
>
> I have been using pass for years, my password stores contains over 500
> passwords and I would like to review them (I know that some of them are
> weak and/or old).
>
> Is there an efficient way to do it?
>
> Considering the following store:
>
> Password Store
> ├── foo
> │ ├── bar
> │ ├── baz
> │ └── qux
> ├── whaterver
> ...
>
> Is it possible to get something like this for instance?
>
> Password Store
> ├── foo
> │ ├── bar: superpassword1
> │ ├── baz: superpassword2
> │ └── qux: superpassword3
> ├── whatever: superpassword4
> ...
>
>
> CA
> _______________________________________________
> Password-Store mailing list
> [email protected]
> https://lists.zx2c4.com/mailman/listinfo/password-store
_______________________________________________
Password-Store mailing list
[email protected]
https://lists.zx2c4.com/mailman/listinfo/password-store