Proton Pass CLI

PassAudited by ClawScan on May 10, 2026.

Overview

This is a coherent Proton Pass CLI guide, but it involves highly sensitive password-vault, sharing, deletion, and secret-injection operations that users should explicitly control.

Use this skill only if you intend the agent to help with Proton Pass. Install the CLI from a trusted Proton source, use interactive authentication where possible, and require explicit confirmation before revealing, sharing, deleting, transferring, or injecting secrets into commands.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A remote installer can modify the local system if the user runs it.

Why it was flagged

The skill tells users how to install the Proton Pass CLI by executing a remote script. The source appears purpose-aligned, but remote installer execution should be verified.

Skill content
curl -fsSL https://proton.me/download/pass-cli/install.sh | bash
Recommendation

Install only from Proton's official site or trusted package managers, and avoid running remote scripts unless you trust the source.

What this means

If copied into an unsafe shell, logs, or shared environment, Proton credentials or 2FA values could be exposed.

Why it was flagged

The skill documents using Proton account authentication factors through environment variables for automation. This is expected for a password-manager CLI but exposes highly sensitive credentials if mishandled.

Skill content
export PROTON_PASS_PASSWORD='your-password' ... export PROTON_PASS_TOTP='123456' ... export PROTON_PASS_EXTRA_PASSWORD='your-extra-password'
Recommendation

Prefer interactive login or secure files over plaintext environment variables, and never let the agent display or store these values.

What this means

A mistaken command could permanently delete stored passwords and secrets.

Why it was flagged

The skill documents destructive Proton Pass vault operations. It includes a warning and the behavior is purpose-aligned, but the impact is high.

Skill content
⚠️ **Warning:** Permanently deletes vault and all items. ... pass-cli vault delete --share-id "abc123def"
Recommendation

Require explicit user confirmation before delete, transfer, sharing, member-role, or bulk mutation commands.

What this means

Secrets could be revealed to a command, script, log, or application that the user did not intend to trust.

Why it was flagged

The skill advertises running applications with secrets injected into their environment or templates. This is central to the stated purpose, but subprocesses may expose those secrets if chosen incorrectly.

Skill content
secret injection (run commands with secrets, inject into templates), environment variable injection
Recommendation

Only inject secrets into trusted commands and avoid printing generated environments, logs, or templates containing secrets.