Open Issues Need Help
View All on GitHubAI Summary: Implement Argon2, a memory-hard key derivation function (KDF), to enhance the security of the ePasswordManager application. This involves integrating Argon2 to hash the master password before storage, and comparing the hash during login, making brute-force attacks significantly more difficult.
AI Summary: Implement per-entry decryption for a Rust-based password manager. This involves encrypting each password individually with a random nonce, decrypting only when the user requests to view or copy a specific password, and securely zeroing out decrypted data in memory afterwards.
AI Summary: Implement a timeout lock feature for the ePasswordManager application. This involves adding functionality to detect user inactivity and, after a configurable period (e.g., 15 minutes), require the user to re-enter their PIN or password before regaining access to the application.
AI Summary: Implement AES-256 encryption for the password database in the ePasswordManager application, storing the encryption key securely in the %LOCALAPPDATA% directory. This enhancement will improve the security of the application by adding another layer of encryption beyond the existing DPAPI.
AI Summary: Implement a feature in a Rust password manager to automatically clear the system clipboard after 30 seconds of copying a password. This is to mitigate the risk of clipboard hijacking.
AI Summary: Modify the Rust password manager to store the encrypted database and key in the user's %LOCALAPPDATA% directory instead of the current working directory. This involves using the Windows API to retrieve the %LOCALAPPDATA% path and updating the application's file storage logic.