Built-in TOTP (Time-based One-Time Password) Support
It would be extremely beneficial if PearPass supported TOTP directly within login entries. Specifically: When adding or editing a login, provide an option to: Scan a TOTP QR code, or Manually enter the TOTP secret/seed. Allow PearPass to generate and autofill one-time passwords (2FA codes) directly in the app and browser extension. This is a standard capability in many modern password managers (e.g., Bitwarden, KeePassXC with plugins) and greatly improves the convenience and security of using 2FA, as it removes the need to rely on separate authenticator applications.

Josh Slaughter 5 months ago
Built-in TOTP (Time-based One-Time Password) Support
It would be extremely beneficial if PearPass supported TOTP directly within login entries. Specifically: When adding or editing a login, provide an option to: Scan a TOTP QR code, or Manually enter the TOTP secret/seed. Allow PearPass to generate and autofill one-time passwords (2FA codes) directly in the app and browser extension. This is a standard capability in many modern password managers (e.g., Bitwarden, KeePassXC with plugins) and greatly improves the convenience and security of using 2FA, as it removes the need to rely on separate authenticator applications.

Josh Slaughter 5 months ago
Add support for deleting a vault
Having the possibility to delete one of my existing vaults would help clean up things for vaults I used for testing/experimenting only. Thank you!

Costin Busioc 5 months ago
Add support for deleting a vault
Having the possibility to delete one of my existing vaults would help clean up things for vaults I used for testing/experimenting only. Thank you!

Costin Busioc 5 months ago
Distributed backup and recovery
Implement a feature to allow users (opt-in) to distribute their vaults encrypted to the network and recover them from a fresh install using a mnemonic phrase or something other deterministic approach.

Alberto Valero 5 months ago
Distributed backup and recovery
Implement a feature to allow users (opt-in) to distribute their vaults encrypted to the network and recover them from a fresh install using a mnemonic phrase or something other deterministic approach.

Alberto Valero 5 months ago
YubiKey Support
U2F-enabled Security Key, such as the YubiKey, user login is bound to the origin, meaning that only the real site can authenticate with the key. The authentication will fail on the fake site even if the user was fooled into thinking it was real. This greatly mitigates against the increasing volume and sophistication of phishing attacks and stops account takeovers. Standard https://www.yubico.com/authentication-standards/fido-u2f-standard/

William K Santiago 5 months ago
YubiKey Support
U2F-enabled Security Key, such as the YubiKey, user login is bound to the origin, meaning that only the real site can authenticate with the key. The authentication will fail on the fake site even if the user was fooled into thinking it was real. This greatly mitigates against the increasing volume and sophistication of phishing attacks and stops account takeovers. Standard https://www.yubico.com/authentication-standards/fido-u2f-standard/

William K Santiago 5 months ago
Add an option to select a default Vault that opens automatically after authenticating.
Selecting the Vault every time, especially when the user has only one, is a drag. This UX is also confusing as it gives the impression that the primary expected action here is to create a Vault. Perhaps add a configurable modifier key (like the option key on macOS, as a default) that shows the list of vaults to select from if pressed when authenticating. Alternatively, add another button to view the Vault list to select from.

Tiger 4 months ago
Add an option to select a default Vault that opens automatically after authenticating.
Selecting the Vault every time, especially when the user has only one, is a drag. This UX is also confusing as it gives the impression that the primary expected action here is to create a Vault. Perhaps add a configurable modifier key (like the option key on macOS, as a default) that shows the list of vaults to select from if pressed when authenticating. Alternatively, add another button to view the Vault list to select from.

Tiger 4 months ago
Link device similar to Keet
Where all your vaults from one device and master password sync to another device. So you can just scan a QR or paste a link on another device and you have the exact same Pearpass on one device as another

kikkarokki 5 months ago
Link device similar to Keet
Where all your vaults from one device and master password sync to another device. So you can just scan a QR or paste a link on another device and you have the exact same Pearpass on one device as another

kikkarokki 5 months ago
Option to sync master password between devices
If any of the devices change master password it changes it for all devices with this enabled

kikkarokki 5 months ago
Option to sync master password between devices
If any of the devices change master password it changes it for all devices with this enabled

kikkarokki 5 months ago
Reduce taps to log in via biometrics and select vault before credentials displayed for android autofill
Request: Reduce the screen taps and options to completing an autofill credential selection using Android autofill. Currently to select an autofill credential a user has to tap "use fingerprint", provide fingerprint then select a vault and finally make the credential selection Please consider having the fingerprint option as default login when opening the app, instant log in. Then have a vault option as default when log in is complete getting you straight to the credential. One fingerprint provided instead of 3 interactions

vanhoopstallion 5 months ago
Reduce taps to log in via biometrics and select vault before credentials displayed for android autofill
Request: Reduce the screen taps and options to completing an autofill credential selection using Android autofill. Currently to select an autofill credential a user has to tap "use fingerprint", provide fingerprint then select a vault and finally make the credential selection Please consider having the fingerprint option as default login when opening the app, instant log in. Then have a vault option as default when log in is complete getting you straight to the credential. One fingerprint provided instead of 3 interactions

vanhoopstallion 5 months ago
π full-text search in notes
A full-text keyword search across note titles and content is required to use PearpPa ss as a single note-taking app, eliminating every other note app.

Sebastiano 5 months ago
π full-text search in notes
A full-text keyword search across note titles and content is required to use PearpPa ss as a single note-taking app, eliminating every other note app.

Sebastiano 5 months ago
Allow importing from Bitwarden encrypted .json
When trying to import from a Bitwarden encrypted .json file, on Linux, the app cannot find any records. It doesn't even ask for the encryption password so I guess it's not implemented yet.

Bitcoin Belly Button 5 months ago
Allow importing from Bitwarden encrypted .json
When trying to import from a Bitwarden encrypted .json file, on Linux, the app cannot find any records. It doesn't even ask for the encryption password so I guess it's not implemented yet.

Bitcoin Belly Button 5 months ago
Trash / Recently Deleted Folder
When a user deletes an item, it should not be permanently removed immediately. Instead, deleted items should be moved to a Trash (or Recently Deleted) folder where they remain for a limited period (for example, 30 days) before being permanently deleted. This would allow users to restore items that were accidentally deleted, improving safety and reducing the risk of losing important credentials. Users should also have the option to manually restore items or permanently delete them from the Trash at any time.

Constantine Mindiashvili 3 months ago
Trash / Recently Deleted Folder
When a user deletes an item, it should not be permanently removed immediately. Instead, deleted items should be moved to a Trash (or Recently Deleted) folder where they remain for a limited period (for example, 30 days) before being permanently deleted. This would allow users to restore items that were accidentally deleted, improving safety and reducing the risk of losing important credentials. Users should also have the option to manually restore items or permanently delete them from the Trash at any time.

Constantine Mindiashvili 3 months ago
Per vault passwords also syncable between devices
So for example you can share a group of vaults and give selective access to them. Say you want family members to have access to your pearpass but only some of the vaults. Another way this might be solved is multiple master passwords each with a different profile and vaults etc

kikkarokki 5 months ago
Per vault passwords also syncable between devices
So for example you can share a group of vaults and give selective access to them. Say you want family members to have access to your pearpass but only some of the vaults. Another way this might be solved is multiple master passwords each with a different profile and vaults etc

kikkarokki 5 months ago
SSH Key Support with Automatic SSH Agent Integration (OpenSSH / Pageant)
Request to add native SSH key management with automatic SSH agent integration. This would turn PearPass into a secure, unified hub for SSH authentication, handling key lifecycle safely in the system agent. Proposed Features: πΉ 1. Entry-Level Key Management Attach private key files directly to vault entries. Auto-decrypt on agent load if the key is password-protected (use credentials from the entry). Display metadata: public key, fingerprints (MD5, SHA256), and key comment. πΉ 2. Lifecycle & Security Controls Add keys to the SSH agent automatically on vault unlock. Remove keys from the agent on vault lock/close. Optional "require confirmation" flag for key usage. Auto-remove timeout after last use (default: 600s, configurable). πΉ 3. UI Dedicated tab/window "Active SSH Keys" showing which keys are currently loaded in the agent. "Clear Agent" button to instantly remove all PearPass-managed keys. πΉ 4. Implementation Notes Integrate with the system OpenSSH agent (Win/Linux/macOS) and/or Pageant (PuTTY). Ensure compatibility with MobaXterm, WinSCP, PuTTY, native OpenSSH, VS Code Remote, etc. Keys must never be written to disk: operate exclusively in memory via the standard SSH agent protocol. Benefits: β Unified password & SSH key manager β Enhanced security: keys reside only in memory, auto-expire, and clear on lock β Seamless workflow with any terminal, IDE, or SSH client Happy to provide feedback or assist with testing. Thanks for your great work! π‘οΈ

Dotpwnpewpew about 2 hours ago
SSH Key Support with Automatic SSH Agent Integration (OpenSSH / Pageant)
Request to add native SSH key management with automatic SSH agent integration. This would turn PearPass into a secure, unified hub for SSH authentication, handling key lifecycle safely in the system agent. Proposed Features: πΉ 1. Entry-Level Key Management Attach private key files directly to vault entries. Auto-decrypt on agent load if the key is password-protected (use credentials from the entry). Display metadata: public key, fingerprints (MD5, SHA256), and key comment. πΉ 2. Lifecycle & Security Controls Add keys to the SSH agent automatically on vault unlock. Remove keys from the agent on vault lock/close. Optional "require confirmation" flag for key usage. Auto-remove timeout after last use (default: 600s, configurable). πΉ 3. UI Dedicated tab/window "Active SSH Keys" showing which keys are currently loaded in the agent. "Clear Agent" button to instantly remove all PearPass-managed keys. πΉ 4. Implementation Notes Integrate with the system OpenSSH agent (Win/Linux/macOS) and/or Pageant (PuTTY). Ensure compatibility with MobaXterm, WinSCP, PuTTY, native OpenSSH, VS Code Remote, etc. Keys must never be written to disk: operate exclusively in memory via the standard SSH agent protocol. Benefits: β Unified password & SSH key manager β Enhanced security: keys reside only in memory, auto-expire, and clear on lock β Seamless workflow with any terminal, IDE, or SSH client Happy to provide feedback or assist with testing. Thanks for your great work! π‘οΈ

Dotpwnpewpew about 2 hours ago
AppImage update mechanism
Introduce AppImage update mechanism, according to the request here https://github.com/tetherto/pearpass-app-desktop/issues/208

Costin Busioc 16 days ago
AppImage update mechanism
Introduce AppImage update mechanism, according to the request here https://github.com/tetherto/pearpass-app-desktop/issues/208

Costin Busioc 16 days ago
Additional Password fields per entry
Some times logins or apps can can have another password or pin so it would be nice to store this under the same entry

muspabotri 4 months ago
Additional Password fields per entry
Some times logins or apps can can have another password or pin so it would be nice to store this under the same entry

muspabotri 4 months ago
Off device encryption key storage
Option to need an additional device to access the decryption key with. This additional device could then deny access after x number failed attempts. The key would not be stored at rest on the device requesting access. Idea is to harden security in situations where a device is more likely to be taken

kikkarokki 5 months ago
Off device encryption key storage
Option to need an additional device to access the decryption key with. This additional device could then deny access after x number failed attempts. The key would not be stored at rest on the device requesting access. Idea is to harden security in situations where a device is more likely to be taken

kikkarokki 5 months ago
Connect multiple browser profiles / extensions
At the moment, PearPass can only be connected to one single browser profile/extension. Request: expand for multi browser support

Costin Busioc 28 days ago
Connect multiple browser profiles / extensions
At the moment, PearPass can only be connected to one single browser profile/extension. Request: expand for multi browser support

Costin Busioc 28 days ago