Skip to content
Go to file

pass import

A pass extension for importing data from most of the existing password manager.


pass import is a password store extension allowing you to import your password database to a password store repository conveniently. It natively supports import from 53 different password managers. More manager support can easily be added.

Passwords are imported into the existing default password store, therefore the password store must have been initialised before with pass init.

By default, pass imports entries at the root of the password store and only keeps the main data (password, login, email, URL, group). This behavior can be changed using the provided options.

Pass import handles duplicates and is compatible with browserpass. It imports OTP secret in a way that is compatible with pass-otp.

pass-import also provides a pimport script that allows importing passwords to other password managers. For instance, you can import passwords to a Keepass database to a generic CSV file...

The following password managers are supported:

Password Manager Formats How to export Data Command line
1password csv v6, 1pif v4, csv v4 See this guide pass import 1password file.csv OR pass import 1password file.1pif OR pass import 1password file.csv
aegis json, json Settings> Tools: Export Plain OR Settings> Tools: Export encrypted pass import aegis file.json OR pass import aegis file.json
andotp json Backups> Backup plain pass import andotp file.json
apple-keychain keychain See this guide pass import applekeychain file.txt
bitwarden csv, json Tools> Export Vault> File Format: .csv OR Tools> Export Vault> File Format: .json pass import bitwarden file.csv OR pass import bitwarden file.json
blur json, csv Settings: Export Data: Export Blur Data OR Settings: Export Data: Export CSV: Accounts: Export CSV pass import blur file.json OR pass import blur file.csv
buttercup csv File > Export > Export File to CSV pass import buttercup file.csv
chrome csv, csv See this guide pass import chrome file.csv OR pass import chrome file.csv
clipperz html Settings > Data > Export: HTML + JSON pass import clipperz file.html
csv csv Nothing to do pass import csv file.csv --cols 'url,login,,password'
dashlane csv, json File > Export > Unsecured Archive in CSV OR File > Export > Unsecured Archive in JSON pass import dashlane file.csv OR pass import dashlane file.json
encryptr csv Compile from source and follow instructions from this guide pass import encryptr file.csv
enpass json v6, csv Menu > File > Export > As JSON OR File > Export > As CSV pass import enpass file.json OR pass import enpass file.csv
firefox csv Add-ons Prefs: Export Passwords: CSV pass import firefox file.csv
fpm xml File > Export Passwords: Plain XML pass import fpm file.xml
freeotp+ json Settings> Export> Export JSON Format pass import freeotp+ file.json
gnome libsecret Nothing to do pass import gnome-keyring <label>
gnome-auth json Backup > in a plain-text JSON file pass import gnome-authenticator file.json
gorilla csv File > Export: Yes: CSV Files pass import gorilla file.csv
kedpm xml File > Export Passwords: Plain XML pass import kedpm file.xml
keepass kdbx, csv, xml Nothing to do OR File > Export > Keepass (CSV) OR File > Export > Keepass (XML) pass import keepass file.kdbx OR pass import keepass file.csv OR pass import keepass file.xml
keepassx xml File > Export to > Keepass XML File pass import keepassx file.xml
keepassx2 kdbx, csv Nothing to do OR Database > Export to CSV File pass import keepassx2 file.kdbx OR pass import keepassx2 file.csv
keepassxc kdbx, csv Nothing to do OR Database > Export to CSV File pass import keepassxc file.kdbx OR pass import keepassxc file.csv
keeper csv Settings > Export : Export to CSV File pass import keeper file.csv
lastpass csv More Options > Advanced > Export pass import lastpass file.csv
myki csv See this guide pass import myki file.csv
network-manager nm Also support specific networkmanager dir and ini file pass import networkmanager
padlock csv Settings > Export Data and copy text into a .csv file pass import padlock file.csv
pass pass Nothing to do pass import pass path/to/store
passman csv, json Settings > Export credentials > Export type: CSV OR Settings > Export credentials > Export type: JSON pass import passman file.csv OR pass import passman file.json
passpack csv Settings > Export > Save to CSV pass import passpack file.csv
passpie yaml v1.0 passpie export file.yml pass import passpie file.yml
pwsafe xml File > Export To > XML Format pass import pwsafe file.xml
revelation xml File > Export: XML pass import revelation file.xml
roboform csv Roboform > Options > Data & Sync > Export To: CSV file pass import roboform file.csv
saferpass csv Settings > Export Data: Export data pass import saferpass file.csv
upm csv Database > Export pass import upm file.csv
zoho csv, csv Tools > Export Secrets: Zoho Vault Format CSV pass import zoho file.csv OR pass import zoho file.csv

The following destination password managers are supported:

Exporters Password Manager Format Command line
csv csv pimport csv src [src]
keepass kdbx pimport keepass src [src]
keepassx2 kdbx pimport keepassx2 src [src]
keepassxc kdbx pimport keepassxc src [src]
pass pass pimport pass src [src]


usage: pass import [-r path] [-p path] [-k KEY] [-a] [-f] [-c] [-C]
                   [--sep CHAR] [--del CHAR] [--cols COLS] [--config CONFIG]
                   [-l] [-h] [-V] [-v | -q]
                   [src [src ...]]

  Import data from most of the password manager. Passwords are imported into
  the existing default password store; therefore, the password store must have
  been initialised before with 'pass init'.

Password managers:
  src                   Path to the data to import. Can also be the password
                        manager name followed by the path to the data to
                        import. The password manager name can be: 1password,
                        aegis, andotp, apple-keychain, bitwarden, blur,
                        buttercup, chrome, clipperz, csv, dashlane, encryptr,
                        enpass, firefox, fpm, freeotp+, gnome, gnome-auth,
                        gorilla, kedpm, keepass, keepassx, keepassx2,
                        keepassxc, keeper, lastpass, myki, network-manager,
                        padlock, pass, passman, passpack, passpie, pwsafe,
                        revelation, roboform, saferpass, upm, zoho

Common optional arguments:
  -r path, --root path  Only import the password from a specific subfolder.
  -p path, --path path  Import the passwords to a specific subfolder.
  -k KEY, --key KEY     Path to a keyfile if required by a manager.
  -a, --all             Also import all the extra data present.
  -f, --force           Overwrite existing passwords.
  -c, --clean           Make the paths more command line friendly.
  -C, --convert         Convert invalid characters present in the paths.

Extra optional arguments:
  --sep CHAR            Provide a characters of replacement for the path
                        separator. Default: '-'
  --del CHAR            Provide an alternative CSV delimiter character.
                        Default: ','
  --cols COLS           CSV expected columns to map columns to credential
                        attributes. Only used by the csv importer.
  --config CONFIG       Set a config file. Default: '.import'

Help related optional arguments:
  -l, --list            List the supported password managers.
  -h, --help            Show this help message and exit.
  -V, --version         Show the program version and exit.
  -v, --verbose         Set verbosity level, can be used more than once.
  -q, --quiet           Be quiet.

More information may be found in the pass-import(1) man page.

Usage for pimport can been seen with pimport -h or man pimport.


Import password from KeePass

pass import keepass.xml
(*) Importing passwords from keepass to pass
 .  Passwords imported from: keepass.xml
 .  Passwords exported to: ~/.password-store
 .  Number of password imported: 6
 .  Passwords imported:

This is the same than: pimport pass keepass.xml --out ~/.password-store

Import password to a different password store

export PASSWORD_STORE_DIR="~/.mypassword-store"
pass init <gpg-id>
pass import keepass.kdbx

Import password to a subfolder

pass import bitwarden.json -p Import/
(*) Importing passwords from bitwarden to pass
 .  Passwords imported from: bitwarden.json
 .  Passwords exported to: ~/.password-store
 .  Root path: Import
 .  Number of password imported: 6
 .  Passwords imported:

Other examples:

  • If the manager is not correctly detected, you can pass it at source argument: pass import dashlane dashlane.csv
  • Import NetworkManager password on default dir: pass import networkmanager
  • Import a NetworkManager INI file: pass import nm.ini
  • Import a One password 1PIF: pass import 1password.1pif
  • Import a One password CSV: pass import 1password.csv
  • Import a Passman JSON file: pass import passman.json
  • Import Lastpass file to a keepass db: pimport keepass lastpass.csv --out keepass.kdbx
  • Import a password store to a CSV file: pimport csv ~/.password-store --out file.csv

Configuration file

Some configurations can be read from a configuration file called .import if it is present at the root of the password repository. The configuration read from this file will be overwritten by their corresponding command-line option if present.

Example of the .import configuration file for the default password repository in ~/.password-store/.import:


# Separator string
separator: '-'

# The list of string that should be replaced by other string. Only activated
# if the `clean` option is enabled.
  ' ': '-'
  '&': 'and'
  '@': At
  "'": ''
  '[': ''
  ']': ''

# The list of protocols. To be removed from the title.
  - http://
  - https://

# The list of invalid characters. Replaced by the separator.
  - '<'
  - '>'
  - ':'
  - '"'
  - '/'
  - '\\'
  - '|'
  - '?'
  - '*'
  - '\0'

Security consideration

Direct import

Passwords should not be written in plain text form on the drive. Therefore when possible, you should import it directly from the encrypted data. For instance, with an encrypted keepass database:

pass import keepass file.kdbx

Secure erasure

Otherwise, if your password manager does not support it, you should take care of securely removing the plain text password database:

pass import lastpass data.csv
shred -u data.csv

Encrypted file

Alternatively, pass-import can decrypt gpg encrypted file before importing it. For example:

pass import lastpass lastpass.csv.gpg

You might also want to update the passwords imported using pass-update.

The import Library

One can use pass-import as a python library. Simply import the classes of the password manager you want to import and export. Then use them in a context manager. For instance, to import password from a cvs Lastpass exported file to password-store:

from pass_import.managers.lastpass import LastpassCSV
from pass_import.managers.passwordstore import PasswordStore

with LastpassCSV('lastpass-export.csv') as importer:

    with PasswordStore('~/.password-store') as exporter: =
        for entry in

Alternatively, you can import the same Lastpass file to a Keepass database:

from pass_import.managers.keepass import Keepass
from pass_import.managers.lastpass import LastpassCSV

with LastpassCSV('lastpass-export.csv') as importer:

    with Keepass('keepass.kdbx') as exporter: =
        for entry in



  • pass 1.7.0 or greater.
  • Python 3.6+
  • python3-setuptools to build and install it.
  • python3-yaml (apt install python3-yaml or pip3 install pyaml)

Optional Requirements

Dependency Required for apt pip
defusedxml Recommended XML library apt install python3-defusedxml pip3 install defusedxml
pykeepass Keepass import from KDBX file N/A pip3 install pykeepass
secretstorage Gnome Keyring import apt install python3-secretstorage pip3 install secretstorage
cryptography AndOTP or Aegis encrypted import apt install python3-cryptography pip3 install cryptography
file-magic Detection of file decryption apt install python-magic pip3 install file-magic


pass-import is available in the Arch User Repository.

yay -S pass-import  # or your preferred AUR install method


pass-import is available under my own debian repository with the package name pass-extension-import. Both the repository and the package are signed with my GPG key: 06A26D531D56C42D66805049C5469996F0DF68EC.

wget -qO - | sudo apt-key add -
echo 'deb [arch=amd64] all main' | sudo tee /etc/apt/sources.list.d/
sudo apt-get update
sudo apt-get install pass-extension-import

Gentoo Linux

layman -a wjn-overlay
emerge app-admin/pass-import


nix-env -iA nixos.passExtensions.pass-import

Using pip

pip install pass-import

This only install the python module and the pimport script, not the extension.

From git

git clone
cd pass-import
sudo make install  # For OSX: make install PREFIX=/usr/local

Stable version

tar xzf pass-import-3.0.tar.gz
cd pass-import-3.0
sudo make install  # For OSX: make install PREFIX=/usr/local

Releases and commits are signed using 06A26D531D56C42D66805049C5469996F0DF68EC. You should check the key's fingerprint and verify the signature:

gpg --recv-keys 06A26D531D56C42D66805049C5469996F0DF68EC
gpg --verify pass-import-3.0.tar.gz.asc

Local install

Alternatively, from git or a stable version you can do a local install with:

cd pass-import
make local


Feedback, contributors, pull requests are all very welcome. Please read the file for more details on the contribution process.


Copyright (C) 2017-2020  Alexandre PUJOL

This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.

This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
GNU General Public License for more details.

You should have received a copy of the GNU General Public License
along with this program.  If not, see <>.
You can’t perform that action at this time.