Dashlane
Access passwords, secure notes, secrets and OTP codes from Dashlane vault.
Access passwords, secure notes, secrets and OTP codes from Dashlane vault.
Real data. Real impact.
Emerging
Developers
Per week
Open source
Skills give you superpowers. Install in 30 seconds.
Access your Dashlane vault from the command line. Read-only access to passwords, secure notes, secrets and OTP codes.
brew install dashlane/tap/dashlane-cli
First sync to trigger authentication:
dcli sync
Steps:
Check current account:
dcli accounts whoami
# Search by URL or title (copies password to clipboard by default) dcli p mywebsite dcli password mywebsiteGet specific field
dcli p mywebsite -f login # Username/login dcli p mywebsite -f email # Email dcli p mywebsite -f otp # TOTP 2FA code dcli p mywebsite -f password # Password (default)
Output formats
dcli p mywebsite -o clipboard # Copy to clipboard (default) dcli p mywebsite -o console # Print to stdout dcli p mywebsite -o json # Full JSON output (all matches)
Search by specific fields
dcli p url=example.com dcli p title=MyBank dcli p id=xxxxxx # By vault ID dcli p url=site1 title=site2 # Multiple filters (OR)
dcli note [filters] dcli n [filters] # ShorthandFilter by title (default)
dcli n my-note dcli n title=api-keys
Output formats: text (default), json
dcli n my-note -o json
Dashlane secrets are a dedicated content type for sensitive data.
dcli secret [filters]Filter by title (default)
dcli secret api_keys dcli secret title=api_keys -o json
# Sync vault manually (auto-sync every hour by default) dcli syncLock the vault (requires master password to unlock)
dcli lock
Logout completely
dcli logout
Backup vault to current directory
dcli backup dcli backup --directory /path/to/backup
# Save master password in OS keychain (default: true) dcli configure save-master-password trueDisable auto-sync
dcli configure disable-auto-sync true
Enable biometrics unlock (macOS only)
dcli configure user-presence --method biometrics
Disable user presence check
dcli configure user-presence --method none
Master password is stored in the Keychain by default. Survives reboots.
dcli configure save-master-password true
No native keychain. Options:
export DASHLANE_MASTER_PASSWORD="..."
save-master-password true stores in ~/.local/share/dcli/Use the
DASHLANE_MASTER_PASSWORD environment variable passed to the container.
docker run -e DASHLANE_MASTER_PASSWORD="..." myimage
Not supported by dcli yet — requires a classic master password.
# Inject secrets into environment variables dcli exec -- mycommandInject into templated files
dcli inject < template.txt > output.txt
Read secret by path
dcli read "dl://vault/secret-id"
dcli p github -f otp # Returns: 123456 (25s remaining)
Store private key in a secure note, then:
dcli n SSH_KEY | ssh-add -
# Get password for a script PASSWORD=$(dcli p myservice -o console)Get JSON and parse with jq
dcli p myservice -o json | jq -r '.[0].password'
dcli sync to unlockdcli --debug <command>Docs: https://cli.dashlane.com
No automatic installation available. Please visit the source repository for installation instructions.
View Installation Instructions1,500+ AI skills, agents & workflows. Install in 30 seconds. Part of the Torly.ai family.
© 2026 Torly.ai. All rights reserved.