EDIT:
This is just secure if your threat model is “having synced passwords, maybe on unencrypted cloud storage”.
Kwallet is not secure, it can easily be read by any program. I stopped using this method myself as it is unnecessarily insecure.
original post
- Open “KWalletManager”
- If not existent, create a new folder called “Passwords” by clicking on the clear area and then “New”
- Open that folder, in here you find multiple folders, one is called “Passwords” in your systems language
- Right click the “Passwords” subfolder and press “new”
- Name the entry for example “Keepass”, click on the entry and “show content”, enter your Keepass Password
- Create an Appstarter for quick-opening your password storage!
You can create an App Desktop Entry like this, open your Terminal and enter:
When using KeepassXC Flatpak:
cat > ~/.local/share/applications/keepassxc-unlock.desktop <<EOF
[Desktop Entry]
Name=Keepass-unlock
Comment=Unlock your KeepassXC vault
Exec=kwallet-query -r KeepassXC kdewallet | /usr/bin/flatpak run --branch=stable --arch=x86_64 --command=keepassxc --file-forwarding org.keepassxc.KeePassXC --pw-stdin ~/passwords.kdbx
Icon=emblem-encrypted-unlocked
Type=Application
EOF
When using a native package:
cat > ~/.local/share/applications/keepassxc-unlock.desktop <<EOF
[Desktop Entry]
Name=Keepass-unlock
Comment=Unlock your KeepassXC vault
Exec=kwallet-query -r KeepassXC kdewallet | keepassxc --pw-stdin ~/passwords.kdbx
Icon=emblem-encrypted-unlocked
Type=Application
EOF
That’s how you create a flaw in your password manager and makes it pointless
In that case Kwallet needs to be fixed. If kwallet is safe, this is safe.
But you can decide how a tool can be safe that allows to extract passwords just like that.
Well, finding and reading this file definitely takes some effort, but an attacker can get your passwords that way as long as kwallet is unlocked.
They just need to run
kwallet-query -r KeepassXC kdewallet
to get the password and then download~/passwords.kdbx