gopass

WarnAudited by ClawScan on May 10, 2026.

Overview

This skill is purpose-aligned with gopass, but it gives the agent broad, under-bounded access to reveal, search, change, delete, sync, and share password-store secrets.

Install this only if you want the agent to help operate your gopass password store. Use it narrowly: name the exact entry, avoid broad searches, do not use auto-confirm for destructive actions, and require explicit approval before showing passwords, deleting entries, syncing, or changing recipients.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If used too broadly, the agent could expose passwords or alter who has access to team secrets.

Why it was flagged

The skill explicitly enables retrieving passwords and changing team recipients for the password store, which is high-impact credential and access-control authority.

Skill content
gopass show path/to/secret           # full entry (password + metadata)
gopass show -o path/to/secret        # password only
...
gopass recipients add <gpg-id>
gopass recipients remove <gpg-id>
Recommendation

Only allow use for specific user-requested entries and require explicit approval before revealing secrets, changing recipients, or modifying store access.

What this means

A mistaken or overbroad invocation could delete many secrets or bypass safety prompts.

Why it was flagged

The documented workflow includes recursive deletion and an auto-confirm option, but the skill does not pair these with mandatory user confirmation or scoping safeguards.

Skill content
gopass rm -r path/to/folder          # recursive
...
Use `gopass --yes` to auto-confirm prompts
Recommendation

Avoid automatic use of recursive deletion or `--yes`; require the user to specify the exact path and confirm destructive actions.

What this means

Passwords, TOTP-related data, and metadata could be exposed in chat history, model context, or downstream tools.

Why it was flagged

The skill encourages returning secret values and searching secret contents in machine-readable form, which can place sensitive credentials into the agent context or logs without stated minimization rules.

Skill content
gopass show -o path/to/secret        # password only
...
gopass grep "username"               # search entry contents
...
Use `gopass show -o path` for machine-readable password-only output
Recommendation

Prefer clipboard-only or user-approved display, avoid broad content searches, and do not retain or repeat secret values unless the user explicitly asks.

What this means

Security depends on the locally installed gopass/GPG setup and its configuration, not on code reviewed with this skill.

Why it was flagged

The skill relies on local gopass and GPG tooling that is outside the reviewed artifact, while the provided install metadata declares no required binaries or install spec.

Skill content
- `gopass` binary installed
- GPG key available (gopass uses GPG for encryption)
- Store initialized (`gopass init` or `gopass setup`)
Recommendation

Verify that gopass and GPG are installed from trusted sources and that the intended store is initialized before using the skill.