bw-cli
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- [Credentials Unsafe] (HIGH): The reference documentation explicitly demonstrates passing sensitive credentials as plaintext command-line arguments, a practice that exposes secrets to the operating system's process list and shell history.
- Evidence in
references/commands.md:bw login [email] [password],bw unlock [password], andbw export --password <pw>. - [Data Exfiltration] (MEDIUM): The skill enables an agent to extract and send sensitive vault data to external locations.
- Evidence in
references/commands.md: Thebw export --rawcommand outputs the entire vault contents to stdout, and thebw sendcommand facilitates sending files or text to Bitwarden's cloud-sharing service. - [Command Execution] (LOW): The skill is designed to facilitate the execution of the
bwbinary on the host system, giving an agent control over vault management operations. - [Indirect Prompt Injection] (LOW): The skill allows an agent to ingest untrusted data from vault items which could contain malicious instructions.
- Ingestion points:
bw get,bw list,bw receive. - Boundary markers: None specified in documentation to prevent the agent from obeying instructions found inside vault notes.
- Capability inventory: High (can delete items, edit vault content, and export data).
- Sanitization: No mention of sanitizing vault content before processing.
Recommendations
- AI detected serious security threats
Audit Metadata