You can't do that directly, but a simple shell script[0] 'll do the
trick. There's also pass-audit[1], which might be better suited. It
checks your password-store against haveibeenpwned.com's password list
and also evaluates the complexity using Dropbox' zxcvbn password
strength estimator. (I've contributed the zxcvbn part to pass-audit, so
call me biased :-) )

[0]: 
    find ~/.password-store/ -name '*.gpg' |
    while read PWFILE; do
        PWFILE=${PWFILE#`realpath ~/.password-store`/}
        echo ${PWFILE%.gpg}:`pass ${PWFILE%.gpg} | head -n1`
    done | column -t -s:

[1]: https://github.com/roddhjav/pass-audit/
On Thu, May 24, 2018 at 05:10:17AM -0700, [email protected] wrote:
> Hello,
> 
> I have been using pass for years, my password stores contains over 500
> passwords and I would like to review them (I know that some of them are
> weak and/or old).
> 
> Is there an efficient way to do it?
> 
> Considering the following store:
> 
> Password Store
> ├── foo
> │   ├── bar
> │   ├── baz
> │   └── qux
> ├── whaterver
> ...
> 
> Is it possible to get something like this for instance?
> 
> Password Store
> ├── foo
> │   ├── bar: superpassword1
> │   ├── baz: superpassword2
> │   └── qux: superpassword3
> ├── whatever: superpassword4
> ...
> 
> 
> CA
> _______________________________________________
> Password-Store mailing list
> [email protected]
> https://lists.zx2c4.com/mailman/listinfo/password-store
_______________________________________________
Password-Store mailing list
[email protected]
https://lists.zx2c4.com/mailman/listinfo/password-store

Reply via email to