Terminal-based smart password manager with deterministic password generation. Generate, manage, and retrieve passwords without storing them - all from your command line.
Project description
CLIPassMan (Console Smart Password Manager) v2.2.2
Terminal-based smart password manager with deterministic password generation. Generate, manage, and retrieve passwords without storing them - all from your command line.
⚠️ Disclaimer
By using this software, you agree to the full disclaimer terms.
Summary: Software provided "AS IS" without warranty. You assume all risks.
Full legal disclaimer: See DISCLAIMER.md
Core Principles:
- Zero-Password Storage: No passwords are ever stored or transmitted
- Deterministic Regeneration: Passwords are recreated identically from your secret phrase
- Metadata Management: Store only descriptions and verification keys
- Terminal Processing: All cryptographic operations happen in your CLI
- On-Demand Discovery: Passwords exist only when you generate them
What You Can Do:
- Create Smart Passwords: Generate deterministic passwords from secret phrases
- Store Metadata Securely: Keep password descriptions and lengths without storing passwords
- Regenerate Passwords: Recreate passwords anytime using your secret phrase
- Manage Services: Organize passwords for different accounts and services
- Secure Terminal Input: Hidden secret phrase entry with getpass
- Verify Secrets: Prove knowledge of secrets without exposing them
- Export/Import: Backup and restore your password metadata
- Cross-Platform Management: Works on any system with Python
- No GUI Dependencies: Pure terminal interface for servers and remote systems
Key Features:
- No Password Database: Eliminates password storage completely
- Interactive Terminal UI: Clean, centered text with visual framing
- Public Key Verification: Verify secret knowledge without exposure
- List View: See all your password metadata in clear lists
- Export/Import: Backup and restore functionality with timestamped files
- Bulk Operations: Clear all passwords with double confirmation
- Secure Hidden Input: Hidden secret phrase entry via getpass
- No Dependencies: Only Python standard library + smartpasslib
- Server Ready: Perfect for headless systems and remote management
Security Model:
- Proof of Knowledge: Verify you know a secret without storing it
- Deterministic Security: Same secret + length = same password, always
- Metadata Separation: Non-sensitive data stored separately from verification
- Local Processing: No data leaves your computer
- No Recovery Backdoors: Lost secret = permanently lost access (by design)
Research Paradigms & Publications
- Pointer-Based Security Paradigm - Architectural Shift from Data Protection to Data Non-Existence
- Local Data Regeneration Paradigm - Ontological Shift from Data Transmission to Synchronous State Discovery
Technical Foundation
Powered by smartpasslib v2.2.0+ - The core library for deterministic password generation.
Key principle: Instead of storing passwords, you store verification metadata. The actual password is regenerated on-demand from your secret phrase.
What's NOT stored:
- Your secret phrase
- The actual password
- Any reversible password data
What IS stored (in ~/.config/smart_password_manager/passwords.json):
- Public verification key (hash of secret)
- Service description
- Password length parameter
Export format: Same JSON structure, can be backed up and restored across different machines running the same software version.
Security model: Proof of secret knowledge without secret storage or password transmission.
File Locations
Starting from v2.2.2, configuration files are stored in:
| Platform | Configuration Path |
|---|---|
| Linux | ~/.config/smart_password_manager/passwords.json |
| macOS | ~/.config/smart_password_manager/passwords.json |
| Windows | C:\Users\Username\.config\smart_password_manager\passwords.json |
Automatic Migration:
- Old
~/.cases.jsonfiles are automatically migrated on first run - Original file is backed up as
~/.cases.json.bak - Migration is one-time and non-destructive
- All your existing passwords are preserved
What's New in v2.2.2
Import/Export Functionality
- Export passwords: Save your password metadata to JSON file with timestamp
- Import passwords: Restore from previously exported files
- Format options: Choose between pretty or minified JSON
- Metadata inclusion: Optional timestamp and version info in export
- Safe import: Merges with existing data, never overwrites existing entries
- Import preview: See export metadata before confirming
- Statistics: Clear feedback on added/skipped/invalid entries
- Filename suggestions: Auto-generated timestamps prevent overwrites
Configuration Migration
- New config location: Now uses
~/.config/smart_password_manager/passwords.json - Automatic migration: Old
~/.cases.jsonfiles are auto-migrated on first run - Cross-platform paths: Works on Linux, macOS, and Windows
- Safe backup: Original file preserved as
.cases.json.bak
Improved Terminal UI
- New menu option: Export/Import in main menu (option 3)
- Better feedback: Clear statistics after import
- Format selection: Choose JSON format during export
- Filename suggestions: Auto-generated timestamps
- Consistent visual styling throughout the application
Security Improvements
- Stronger public key verification using enhanced cryptographic methods
- Better input validation with clear error messages
- Duplicate detection - prevents creating multiple entries with same secret
- Case-sensitive secrets with clear user warnings
Installation & Quick Start
Prerequisites
- Python 3.7+ required
- pip for package management
Quick Run from Repository
# Clone and run in one go
git clone https://github.com/smartlegionlab/clipassman.git
cd clipassman
python clipassman/clipassman.py
Quick Installation
# Install from PyPI
pip install clipassman
# For systems with package conflicts
pip install clipassman --break-system-packages
# Verify installation
clipassman
Manual Installation
# Clone repository
git clone https://github.com/smartlegionlab/clipassman.git
cd clipassman
# Install in development mode
pip install -e .
# Or install from local source
pip install .
Quick Usage Guide
Launching the Application
# Start interactive terminal interface
clipassman
# Or if installed locally
python -m clipassman.clipassman
Creating Your First Password
- Launch
clipassman - Select option 1: Add Password
- Enter service description (e.g., "GitHub Account")
- Enter your secret phrase (never shared or stored)
- Confirm your secret phrase
- Set password length (4-100 characters)
- Password is generated and displayed
- Save it securely (not stored by system)
Retrieving a Password
- Launch
clipassman - Select option 2: Get/Delete Password
- Choose password entry from numbered list
- Select 1: Get password
- Enter your secret phrase (hidden input)
- Password regenerates identically
Exporting Passwords
- Launch
clipassman - Select option 3: Export/Import Passwords
- Select 1: Export passwords to file
- Choose filename (or press Enter for auto-generated with timestamp)
- Select format (1: pretty JSON, 2: minified JSON)
- Choose whether to include metadata (y/n)
- File is saved with all your password metadata
- Success message with filename and password count
Importing Passwords
- Launch
clipassman - Select option 3: Export/Import Passwords
- Select 2: Import passwords from file
- Enter filename to import
- Review export metadata if present (date, version, count)
- Confirm import (y/n)
- See statistics of added/skipped/invalid entries
- Table automatically refreshes with new passwords
Deleting Passwords
- Select option 2: Get/Delete Password
- Choose password entry
- Select 2: Delete entry
- Confirm deletion with 'y'
- Only metadata removed - password can be recreated with secret
Clearing All Passwords
- Select option 4: Clear All Passwords
- First confirmation with 'y'
- Type 'DELETE ALL' to confirm
- All password entries are removed
Managing Passwords
# Main menu options:
1: Add Password # Create new password
2: Get/Delete Password # Retrieve or remove password
3: Export/Import # Backup or restore password metadata
4: Clear All Passwords # Remove all entries (double confirmation)
5: Help # View documentation
0: Exit # Quit application
Windows Standalone Executable
Creating a Single-File *.exe
Build a standalone clipassman.exe that runs without Python installation:
Step 1: Get the Project Files
- Download project ZIP:
- Go to: https://github.com/smartlegionlab/clipassman
- Click green "Code" button
- Select "Download ZIP"
- Extract to:
C:\clipassman-master
Step 2: Install Python
- Download Python installer from: https://python.org/downloads/
- Run installer
- IMPORTANT: Check "Add Python to PATH"
- Click "Install Now"
Step 3: Open Command Prompt
- Press
Win + R - Type
cmd, press Enter - Navigate to project folder:
cd C:\clipassman-master
Step 4: Create Virtual Environment
# Create virtual environment
python -m venv venv
# Activate it (IMPORTANT!)
.\venv\Scripts\activate
# You should see (venv) in your command prompt
Step 5: Install Dependencies
# Install PyInstaller in virtual environment
pip install pyinstaller
pip install smartpasslib>=2.2.0
Step 6: Build Executable
# Build single .exe file
pyinstaller --onefile --console --name "clipassman.exe" clipassman/clipassman.py
# Wait for build to complete (1-2 minutes)
Step 7: Find and Use
Location: C:\clipassman-master\dist\clipassman.exe
Create desktop shortcut:
- Open
C:\clipassman-master\dist\folder - Right-click
clipassman.exe - Select "Create shortcut"
- Drag shortcut to desktop
- Rename shortcut to "CLIPassMan"
- Double-click to start
What you get:
- Single file:
clipassman.exe(~10MB) - No Python required to run
- Works on any Windows 10/11 PC
- Can be copied to USB drive
Core Components
Terminal Interface Features
Main Menu:
********************************************************************************
********************** Smart Password Manager CLI v2.2.2 ***********************
******************************* Version: v2.2.2 ********************************
------------------------ Main Menu | Total passwords: 0 ------------------------
1: Add Password
2: Get/Delete Password
3: Export/Import Passwords
4: Clear All Passwords
5: Help
0: Exit
Choose an action:
Password Creation:
- Description input with validation
- Secret phrase entry with confirmation
- Password length selection (4-100 characters)
- Public key generation and display
- Generated password display
Password Retrieval:
- Numbered list of password entries
- Secret phrase entry via getpass (hidden)
- Public key verification
- Password regeneration
Export/Import Interface:
------------------------ Export/Import Menu ------------------------
1: Export passwords to file
2: Import passwords from file
0: ← Back to Main Menu
Choose an action:
Security Implementation
Public Key System:
# Generate public key from secret
public_key = SmartPasswordMaster.generate_public_key(secret)
# Verify secret without exposing it
is_valid = SmartPasswordMaster.check_public_key(secret, public_key)
# Generate password deterministically
password = SmartPasswordMaster.generate_smart_password(secret, length)
Input Security:
- Hidden secret input via
getpass.getpass() - Case-sensitive secret validation
- Duplicate detection prevention
- Input sanitization and validation
Advanced Usage
Password Management Strategy
For Multiple Accounts:
Description Examples:
- GitHub Personal Account
- Work Email - Office 365
- Social Media - Twitter
- Cloud Storage - Dropbox
Length Strategy:
- Critical accounts: 20-24 characters
- Important accounts: 16-20 characters
- General accounts: 12-16 characters
- Temporary accounts: 8-12 characters
Secret Phrase Management
Best Practices:
- Unique per service - Different secret for each account type
- Memorable but complex - Phrases you can remember but others can't guess
- Case-sensitive - v2.2.2 enforces exact case matching
- No digital storage - Keep only in memory or physical backup
- Backup plan - Physical written backup in secure location
- Export regularly - Backup metadata after adding new passwords
Example Secret Phrases:
Good: "MyFavoriteCoffeeShop@2025#Boston"
Good: "PurpleElephantsDanceInMoonlight42"
Avoid: "password123", "letmein", "123456"
Backup Strategy
Recommended workflow:
- Export metadata after adding new passwords
- Store exports in secure, encrypted location
- Keep exports across different machines for synchronization
- Test import on a separate machine before relying on backups
- Use timestamped exports to maintain version history
Ecosystem Integration
Part of Smart Password Suite
Core Technology:
- smartpasslib - Core password generation library
Desktop Application:
- Desktop Smart Password Manager - Graphical interface with edit capabilities
Other CLI Tools:
- CLI Smart Password Generator - Terminal-based password generation only
Web Interface:
- Web Smart Password Manager - Browser-based access
Data Compatibility
- Uses same
~/.config/smart_password_manager/passwords.jsonformat as desktop manager - Export files compatible across all ecosystem tools
- Consistent cryptographic operations across platforms
- Can share password metadata between CLI and desktop versions
Comparison with Desktop Version
CLI Advantages:
- No GUI dependencies
- Works on servers and headless systems
- Faster for keyboard-centric users
- Scriptable and automatable
- Lower resource usage
Desktop Advantages:
- Graphical interface with table view
- Edit functionality for metadata
- Copy to clipboard with one click
- Better visual feedback
- Mouse support
- Context menu for quick actions
License
Copyright (c) 2026, Alexander Suvorov
Support
- CLI Manager Issues: GitHub Issues
- Core Library Issues: smartpasslib Issues
- Documentation: Inline help (option 5) and this README
Note: Always test password generation with non-essential accounts first. Implementation security depends on proper usage.
Security Warnings
Secret Phrase Security
Your secret phrase is the cryptographic master key
- Permanent data loss: Lost secret phrase = irreversible loss of all derived passwords
- No recovery mechanisms: No password recovery, no secret reset, no administrative override
- Deterministic generation: Identical input (secret + length) = identical output (password)
- Single point of failure: Secret phrase is the sole authentication factor for all passwords
- Secure storage required: Digital storage of secret phrases is prohibited
Critical: Test password regeneration with non-essential accounts before production use
Export/Import Security Notes
- Export files contain ONLY metadata (public keys, descriptions, lengths)
- No passwords or secret phrases are ever exported
- Export files are plain JSON - store them securely
- Treat exported metadata as sensitive information
- Timestamped exports help maintain backup history
Version: 2.2.2 | Author: Alexander Suvorov
Terminal Interface Examples
Main Interface
********************************************************************************
********************** Smart Password Manager CLI v2.2.2 ***********************
******************************* Version: v2.2.2 ********************************
------------------------ Main Menu | Total passwords: 0 ------------------------
1: Add Password
2: Get/Delete Password
3: Export/Import Passwords
4: Clear All Passwords
5: Help
0: Exit
Choose an action: 1
---------------------------- Add new smart password ----------------------------
-------------------------------------------------------------------
Enter a descriptive name for this password (e.g., "GitHub Account")
-------------------------------------------------------------------
Description: Account 1
IMPORTANT: Your secret phrase:
• Is case-sensitive
• Should be memorable but secure
• Will generate the same password every time
• Is never stored - only the hash is saved
Enter secret phrase (hidden):
Confirm secret phrase (hidden):
Enter password length (4-100): 16
--------------------------------------------------------------------------------
✓ Password metadata added successfully!
Description: Account 1
Length: 16 characters
Public Key: d8295cdc1a8e3094...bb4b558bf7d70b4b
--------------------------- Your generated password: ---------------------------
wcJjBKIhsgV%!6Iq
--------------------------------------------------------------------------------
Press Enter to continue...
------------------------ Main Menu | Total passwords: 1 ------------------------
1: Add Password
2: Get/Delete Password
3: Export/Import Passwords
4: Clear All Passwords
5: Help
0: Exit
Choose an action: 3
------------------------------ Export/Import Menu ------------------------------
1: Export passwords to file
2: Import passwords from file
0: ← Back to Main Menu
Choose an action: 1
------------------------------- Export Passwords -------------------------------
Total passwords: 1
Default filename: passwords_export_20260218_124959.json
Enter filename (or press Enter for default):
Export format:
1: Pretty JSON (readable, with indentation)
2: Minified JSON (smaller size)
Choose format (1/2): 1
Include export metadata (timestamp, version)? (y/n): y
--------------------------------------------------------------------------------
✓ Successfully exported 1 passwords to:
passwords_export_20260218_124959.json
Press Enter to continue...
------------------------------ Export/Import Menu ------------------------------
1: Export passwords to file
2: Import passwords from file
0: ← Back to Main Menu
Choose an action: 2
------------------------------- Import Passwords -------------------------------
Current passwords: 1
Enter filename to import: /home/user/passwords_export_20260218_124959.json
Export metadata:
Date: 2026-02-18T12:50:18.597439
App version: 2.2.2
Passwords in file: 1
Found 1 passwords in file
Proceed with import? (y/n): y
--------------------------------------------------------------------------------
✓ Import completed:
• Added: 0 new passwords
• Skipped (already exist): 1
Press Enter to continue...
------------------------------ Export/Import Menu ------------------------------
1: Export passwords to file
2: Import passwords from file
0: ← Back to Main Menu
Choose an action: 0
------------------------ Main Menu | Total passwords: 1 ------------------------
1: Add Password
2: Get/Delete Password
3: Export/Import Passwords
4: Clear All Passwords
5: Help
0: Exit
Choose an action: 5
------------------------------------- Help -------------------------------------
CLIPASSMAN v2.2.2 - Console Smart Password Manager
HOW IT WORKS:
1. Provide a secret phrase
2. System generates a public key from the secret
3. Password is generated deterministically
4. Same secret + same length = same password every time
To retrieve a password:
1. Enter the same secret phrase
2. Password is regenerated identically
SECURITY NOTES:
• Passwords are NEVER stored anywhere
• Case-sensitive secret phrases
• Lost secret phrase = permanently lost passwords
• Public key can be stored for verification
For more information, visit the project page on GitHub: https://github.com/smartlegionlab/clipassman
----------------------------------------------------------------------
Complete documentation: https://github.com/smartlegionlab/smartpasslib
----------------------------------------------------------------------
--------------------------------------------------------------------------------
Press Enter to continue...
------------------------ Main Menu | Total passwords: 1 ------------------------
1: Add Password
2: Get/Delete Password
3: Export/Import Passwords
4: Clear All Passwords
5: Help
0: Exit
Choose an action: 0
----------------- https://github.com/smartlegionlab/clipassman -----------------
--------------------- Copyright © 2026, Alexander Suvorov ----------------------
================================================================================
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file clipassman-2.2.2.tar.gz.
File metadata
- Download URL: clipassman-2.2.2.tar.gz
- Upload date:
- Size: 26.1 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.14.3
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
375c1bf2e543293fb2012ef12421e6654c8731d2e290508a1430f194a4719408
|
|
| MD5 |
085734bbe18f30b5f5c908c814c1a154
|
|
| BLAKE2b-256 |
97226915e10384e3fcad243ba204627b01d0bf8d63f45c3b9c383899623a948b
|
File details
Details for the file clipassman-2.2.2-py3-none-any.whl.
File metadata
- Download URL: clipassman-2.2.2-py3-none-any.whl
- Upload date:
- Size: 26.6 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.14.3
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
ab5969983f9c8736de3e57e22c5ef2cdb82d10969448e46dc8cabc132caefa4b
|
|
| MD5 |
80374eff167becb44e0f144fd7e42f35
|
|
| BLAKE2b-256 |
7f9c2e2a84e45a584e5a25edd12ce824965cd28848e59d3de3a8dc05ae95d8fc
|