QtPass 1.5.1

A modern, cross-platform GUI for pass.

Get Started GitHub IJHack/QtPass

QtPass MainWindow

Password management for everyone

QtPass is part of the pass ecosystem - the standard UNIX password manager. Your passwords are encrypted with GPG and can be synced across all your devices using Git.

Unlike many password managers, QtPass isn't tied to one platform or cloud service. Use it alongside other pass-compatible clients on mobile, CLI, or browser.

Supports smartcards and YubiKeys for extra security - your private keys never leave the device.

Linux Compatible Windows 11 Compatible macOS Compatible FreeBSD Compatible

Features

Installation

New to QtPass? Follow the getting started guide.

Linux

Arch

pacman -S qtpass

OpenSUSE & Fedora

yum install qtpass
dnf install qtpass

Debian, Ubuntu and derivates like Kali & Raspbian

apt-get install qtpass

Gentoo

emerge -atv qtpass

FreeBSD

pkg install qtpass
cd /usr/ports/sysutils/qtpass/ && make install clean

More options

Windows

Latest stable on the releases page, latest build via AppVeyor.

Via Chocolatey
choco install qtpass

macOS

Latest stable on the releases page.

Via Homebrew
brew install qtpass --cask

Build from source

Build on Linux/BSD:

qmake && make && make install

Build on macOS:

brew install qt
qmake && make && macdeployqt QtPass.app

Security

QtPass uses GPG encryption - your passwords are never stored in plain text. Using a smartcard or YubiKey keeps your private keys secure even if your computer is compromised.

Your password store syncs via Git, so you control where it's hosted and always have a backup. Per-folder encryption lets you share passwords securely with family or team members.

For detailed security analysis, see the whitepaper.

Contributing

QtPass is open source. Contributions are welcome!

Known issues

Insecure Password Generation prior to 1.2.1

All passwords generated with QtPass' built-in password generator prior to 1.2.1 are possibly predictable and enumerable by hackers.
The generator used libc's random(), seeded with srand(msecs), where msecs is not the msecs since 1970 (not that that'd be secure anyway), but rather the msecs since the last second. This means there are only 1000 different sequences of generated passwords.

Read more about this issue on Github.
Please note that this is an issue with the QtPass GUI and not in pass or the greater password-store ecosystem.

We advice to update to 1.2.1 or later as soon as possible and change any password you may have generated with the QtPass' password generator.

FAQ

Can't save a password

I have an issue with GNOME keyring

enable-ssh-support
write-env-file
use-standard-socket
default-cache-ttl 600
max-cache-ttl 7200

See the pass FAQ for more troubleshooting tips.

Can I import from KeePass, LastPass or X?

More questions?

Changelog