dashlane

Access passwords, secure notes, secrets and OTP codes from Dashlane vault.

533 stars

Best use case

dashlane is best used when you need a repeatable AI agent workflow instead of a one-off prompt.

Access passwords, secure notes, secrets and OTP codes from Dashlane vault.

Teams using dashlane should expect a more consistent output, faster repeated execution, less prompt rewriting.

When to use this skill

  • You want a reusable workflow that can be run more than once with consistent structure.

When not to use this skill

  • You only need a quick one-off answer and do not need a reusable workflow.
  • You cannot install or maintain the underlying files, dependencies, or repository context.

Installation

Claude Code / Cursor / Codex

$curl -o ~/.claude/skills/dashlane/SKILL.md --create-dirs "https://raw.githubusercontent.com/sundial-org/awesome-openclaw-skills/main/skills/dashlane/SKILL.md"

Manual Installation

  1. Download SKILL.md from GitHub
  2. Place it in .claude/skills/dashlane/SKILL.md inside your project
  3. Restart your AI agent — it will auto-discover the skill

How dashlane Compares

Feature / AgentdashlaneStandard Approach
Platform SupportNot specifiedLimited / Varies
Context Awareness High Baseline
Installation ComplexityUnknownN/A

Frequently Asked Questions

What does this skill do?

Access passwords, secure notes, secrets and OTP codes from Dashlane vault.

Where can I find the source code?

You can find the source code on GitHub using the link provided at the top of the page.

SKILL.md Source

# Dashlane CLI

Access your Dashlane vault from the command line. Read-only access to passwords, secure notes, secrets and OTP codes.

## Installation

```bash
brew install dashlane/tap/dashlane-cli
```

## Authentication

First sync to trigger authentication:
```bash
dcli sync
```

**Steps:**
1. Enter your Dashlane email
2. **⚠️ IMPORTANT: Open the URL shown in your browser** (device registration)
3. Enter the code received by email
4. Enter your Master Password

Check current account:
```bash
dcli accounts whoami
```

## Get a Password

```bash
# Search by URL or title (copies password to clipboard by default)
dcli p mywebsite
dcli password mywebsite

# Get specific field
dcli p mywebsite -f login      # Username/login
dcli p mywebsite -f email      # Email
dcli p mywebsite -f otp        # TOTP 2FA code
dcli p mywebsite -f password   # Password (default)

# Output formats
dcli p mywebsite -o clipboard  # Copy to clipboard (default)
dcli p mywebsite -o console    # Print to stdout
dcli p mywebsite -o json       # Full JSON output (all matches)

# Search by specific fields
dcli p url=example.com
dcli p title=MyBank
dcli p id=xxxxxx               # By vault ID
dcli p url=site1 title=site2   # Multiple filters (OR)
```

## Get a Secure Note

```bash
dcli note [filters]
dcli n [filters]               # Shorthand

# Filter by title (default)
dcli n my-note
dcli n title=api-keys

# Output formats: text (default), json
dcli n my-note -o json
```

## Get a Secret

Dashlane secrets are a dedicated content type for sensitive data.

```bash
dcli secret [filters]

# Filter by title (default)
dcli secret api_keys
dcli secret title=api_keys -o json
```

## Other Commands

```bash
# Sync vault manually (auto-sync every hour by default)
dcli sync

# Lock the vault (requires master password to unlock)
dcli lock

# Logout completely
dcli logout

# Backup vault to current directory
dcli backup
dcli backup --directory /path/to/backup
```

## Configuration

```bash
# Save master password in OS keychain (default: true)
dcli configure save-master-password true

# Disable auto-sync
dcli configure disable-auto-sync true

# Enable biometrics unlock (macOS only)
dcli configure user-presence --method biometrics

# Disable user presence check
dcli configure user-presence --method none
```

## Persistence by Platform

### macOS
Master password is stored in the **Keychain** by default. Survives reboots.
```bash
dcli configure save-master-password true
```

### Linux (server/headless)
No native keychain. Options:
1. **Environment variable** (less secure, but simple):
   ```bash
   export DASHLANE_MASTER_PASSWORD="..."
   ```
2. **Local encrypted file**: `save-master-password true` stores in `~/.local/share/dcli/`
3. **External secret manager** (Vault, AWS Secrets, etc.) to inject the variable

### Docker / CI
Use the `DASHLANE_MASTER_PASSWORD` environment variable passed to the container.
```bash
docker run -e DASHLANE_MASTER_PASSWORD="..." myimage
```

### SSO / Passwordless
Not supported by dcli yet — requires a classic master password.

## Advanced: Inject Secrets

```bash
# Inject secrets into environment variables
dcli exec -- mycommand

# Inject into templated files
dcli inject < template.txt > output.txt

# Read secret by path
dcli read "dl://vault/secret-id"
```

## Examples

### Get OTP for 2FA
```bash
dcli p github -f otp
# Returns: 123456 (25s remaining)
```

### SSH Keys from Vault
Store private key in a secure note, then:
```bash
dcli n SSH_KEY | ssh-add -
```

### Scripting
```bash
# Get password for a script
PASSWORD=$(dcli p myservice -o console)

# Get JSON and parse with jq
dcli p myservice -o json | jq -r '.[0].password'
```

## Troubleshooting

- **Locked?** Run `dcli sync` to unlock
- **SSO users:** Need Chrome installed + visual interface
- **Password-less:** Not supported yet
- **Debug mode:** `dcli --debug <command>`

Docs: https://cli.dashlane.com

Related Skills

portfolio-watcher

533
from sundial-org/awesome-openclaw-skills

Monitor stock/crypto holdings, get price alerts, track portfolio performance

portainer

533
from sundial-org/awesome-openclaw-skills

Control Docker containers and stacks via Portainer API. List containers, start/stop/restart, view logs, and redeploy stacks from git.

portable-tools

533
from sundial-org/awesome-openclaw-skills

Build cross-device tools without hardcoding paths or account names

polymarket

533
from sundial-org/awesome-openclaw-skills

Trade prediction markets on Polymarket. Analyze odds, place bets, track positions, automate alerts, and maximize returns from event outcomes. Covers sports, politics, entertainment, and more.

polymarket-traiding-bot

533
from sundial-org/awesome-openclaw-skills

No description provided.

polymarket-analysis

533
from sundial-org/awesome-openclaw-skills

Analyze Polymarket prediction markets for trading edges. Pair Cost arbitrage, whale tracking, sentiment analysis, momentum signals, user profile tracking. No execution.

polymarket-agent

533
from sundial-org/awesome-openclaw-skills

Autonomous prediction market agent - analyzes markets, researches news, and identifies trading opportunities

polymarket-5

533
from sundial-org/awesome-openclaw-skills

Query Polymarket prediction markets. Use for questions about prediction markets, betting odds, market prices, event probabilities, or when user asks about Polymarket data.

polymarket-4

533
from sundial-org/awesome-openclaw-skills

Query Polymarket prediction markets. Use for questions about prediction markets, betting odds, market prices, event probabilities, or when user asks about Polymarket data.

polymarket-3

533
from sundial-org/awesome-openclaw-skills

Query Polymarket prediction market odds and events via CLI. Search for markets, get current prices, list events by category. Supports sports betting (NFL, NBA, soccer/EPL, Champions League), politics, crypto, elections, geopolitics. Real money markets = more accurate than polls. No API key required. Use when asked about odds, probabilities, predictions, or "what are the chances of X".

polymarket-2

533
from sundial-org/awesome-openclaw-skills

Query Polymarket prediction markets - check odds, trending markets, search events, track prices.

pollinations

533
from sundial-org/awesome-openclaw-skills

Pollinations.ai API for AI generation - text, images, videos, audio, and analysis. Use when user requests AI-powered generation (text completion, images, videos, audio, vision/analysis, transcription) or mentions Pollinations. Supports 25+ models (OpenAI, Claude, Gemini, Flux, Veo, etc.) with OpenAI-compatible chat endpoint and specialized generation endpoints.