login
by BytesAgain
Store, retrieve, and manage login credentials securely using bash and Python with local encryption. Use when saving website logins, API keys, or generating secure passwords.
安装
claude skill add --url github.com/openclaw/skills/tree/main/skills/bytesagain/login文档
Login — Credential Manager & Password Vault
A local credential management tool for storing website logins, API keys, and service credentials securely. Features include password generation, credential search, strength checking, and encrypted export. All data is stored locally in JSONL format with optional field-level obfuscation.
Prerequisites
- Python 3.6+
- Bash 4+
Data Storage
All credential records are stored in ~/.login/data.jsonl. Each record is a JSON object with fields including id, type (credential, note), service, username, password (base64-obfuscated), url, tags, created_at, updated_at, and optional metadata.
Commands
Run via: bash scripts/script.sh <command> [options]
| Command | Description |
|---|---|
add | Add a new credential entry with service name, username, password, and URL |
list | List all stored credentials (passwords masked by default) |
get | Retrieve a specific credential by ID or service name (shows password) |
update | Update an existing credential's username, password, URL, or tags |
delete | Remove a credential entry by ID |
search | Search credentials by service name, username, URL, or tags |
generate | Generate a secure random password with configurable length and rules |
strength | Check the strength of a given password and provide improvement tips |
duplicate | Find credentials with duplicate or similar passwords |
expire | List credentials older than a specified number of days |
export | Export credentials to encrypted JSON or CSV format |
import | Import credentials from a JSON or CSV file |
help | Show usage information |
version | Print the tool version |
Usage Examples
# Add a new credential
bash scripts/script.sh add --service "GitHub" --username "myuser" --password "s3cureP@ss" --url "https://github.com" --tags "dev,git"
# List all credentials (passwords masked)
bash scripts/script.sh list
# Get a specific credential (shows password)
bash scripts/script.sh get --service "GitHub"
# Get by ID
bash scripts/script.sh get --id abc123
# Update a credential
bash scripts/script.sh update --id abc123 --password "newP@ssw0rd!" --tags "dev,git,work"
# Delete a credential
bash scripts/script.sh delete --id abc123
# Search by tag
bash scripts/script.sh search --tag "dev"
# Search by service name
bash scripts/script.sh search --query "git"
# Generate a 20-character password
bash scripts/script.sh generate --length 20 --symbols --numbers --uppercase
# Generate without ambiguous characters
bash scripts/script.sh generate --length 16 --no-ambiguous
# Check password strength
bash scripts/script.sh strength --password "mypassword123"
# Find duplicate passwords
bash scripts/script.sh duplicate
# Find credentials older than 90 days
bash scripts/script.sh expire --days 90
# Export encrypted
bash scripts/script.sh export --format json --output credentials.json
# Import from file
bash scripts/script.sh import --file credentials.csv --format csv
Output Format
list returns a masked table with service, username, and URL. get returns full JSON including the decoded password. generate outputs the generated password to stdout. strength returns a score (0-100) with a rating and tips. duplicate and expire return filtered credential lists.
Notes
- Passwords are stored with base64 obfuscation — this is NOT encryption. For true security, use OS-level disk encryption.
- Password generation supports: uppercase, lowercase, digits, symbols, and exclusion of ambiguous characters (
0O1lI). - Strength scoring considers: length, character variety, common patterns, dictionary words, and entropy.
- Strength ratings:
weak(0-30),fair(31-50),good(51-70),strong(71-90),excellent(91-100). - The
expirecommand helps identify stale credentials that should be rotated. - The
duplicatecommand identifies password reuse across services. - Export with
--format jsonincludes all fields; CSV omits sensitive notes. - Import supports merging or overwriting existing entries.
- All IDs are auto-generated 8-character hex strings.
Powered by BytesAgain | bytesagain.com | hello@bytesagain.com
相关 Skills
安全专家
by alirezarezvani
覆盖威胁建模、漏洞评估、安全架构设计、代码审计与渗透测试,内置 STRIDE、OWASP、加密模式和安全扫描流程,适合系统设计评审与上线前安全排查。
✎ 安全专家把威胁建模、漏洞分析到渗透测试串成一套流程,内置 STRIDE 与 OWASP 指南,做安全设计和排查更省心。
安全运营
by alirezarezvani
覆盖应用安全、漏洞管理与合规审计,支持代码/依赖扫描、CVE 评估、Secrets 检测和安全自动化,适合做安全基线落地、漏洞响应、审计检查与安全开发治理。
✎ 应用安全、漏洞管理和合规检查一套打通,还能自动化扫描与响应,帮团队更早发现并收敛风险。
安全审计
by alirezarezvani
安装前审计 Claude Code Skill 的代码执行、Prompt 注入和依赖供应链风险,支持本地目录或 Git 仓库扫描,输出 PASS/WARN/FAIL 结论及修复建议
✎ 把代码审查、漏洞扫描和合规检查串成一条线,帮团队更早发现风险,做安全治理更省心。
相关 MCP 服务
by Sentry
搜索和分析 Sentry 错误报告,辅助调试。
✎ 把零散的 Sentry 错误报告变成可检索线索,帮你在海量报错里更快定位线上故障,排障调试明显省时。
by sinewaveai
为 AI agents 提供安全层:拦截 prompt injection、识别伪造 packages,并扫描漏洞风险。
✎ 给 AI Agent 补上关键安全层,能拦截 prompt 注入、识别伪造包并扫描漏洞风险,把防护前置更省心。
by pantheon-security
强化安全性的 NotebookLM MCP,集成 post-quantum encryption,提升数据防护能力。