BreachWatch Commands

This page shows commands related to BreachWatch and their responses.

Overview

BreachWatch is a powerful, secure add-on feature that monitors the internet and dark web for breached accounts matching records stored within your Keeper Vault. BreachWatch delivers the most in-depth monitoring available to the public with a database of over a billion records while upholding Keeper's state-of-the-art, zero-knowledge security architecture. More details can be found here.

User Experience

To sign up for BreachWatch from Keeper's Web Vault or mobile app, navigate to the BreachWatch screen and follow the on-screen prompts. You can also purchase BreachWatch directly from the Keeper Security website. After signup, BreachWatch performs a local scan of passwords that are currently stored in your Keeper vault.

BreachWatch Supports 4 Commands in SDK.

BreachWatch List

The breachwatch list command lists Keeper Vault records and their associated password breach status as detected by the BreachWatch service. It helps identify weak, reused, or breached passwords in your vault.

DotNet CLI

Command: breachwatch list

Flags:

  • — numbered: This flag displays breachwatch records in a serial numbered order

  • — owned: This flag displays breachwatch records which belong to the owner

  • — all: This flag displays breachwatch record which the current user has access to. There can be both owned records and records which are shared to user which have a different owner.

Example:

My Vault> breachwatch list --numbered --owned
S.No  Record UID              Title                      Description        
----  ----------------------  -------------------------  -------------------
2     record_uid              DemoRecordForWeakPassword  [email protected]      
1     record_uid              breachwatchIgnoreTest3     [email protected]
3     record_uid              DemoBreachWatchRecord      
DotNet SDK

Function: BreachWatchRecords()

The below call can be made provided that vault is initiated and synced.

Example:

PowerCommander

Command: Get-KeeperBreachWatchList

Flags:

Example:

Python CLI

Command: breachwatch list

Options:

  • -n --numbered Displayed records as a numbered list

  • -a --all Display all breached records (default - first 30 records)

  • -o --owned Display only breached records owned by user

Example:

Python SDK

Function: breach_watch_records

BreachWatch Scan

The breachwatch scan command is used to submit newly created or updated passwords in your vault for BreachWatch scanning. This scan detects whether the password is reused, weak, or compromised.

Use it after creating or modifying records with passwords, especially if they were added outside of Keeper apps (e.g., via: Commander CLI, API scripts etc).

DotNet CLI

Command: breachwatch scan

Example:

DotNet SDK

Function: ScanAndStoreRecordStatusAsync

This function requires record Uids as a list of string

Example:

PowerCommander

Command: Not Supported

Python CLI

Command: breachwatch scan

Parameters:

  • -r --records Record UIDs to be scanned

Example:

Python SDK

Function: scan_and_store_record_status

BreachWatch Password

breachWatch password is a Keeper security feature that continuously monitors your stored vault passwords for exposure in public data breaches. It analyses passwords using zero-knowledge encryption to determine if they are Safe or not.

DotNet CLI

Command: breachwatch password

Example:

DotNet SDK

Function: ScanPasswordsAsync Example:

PowerCommander

Command: Test-PasswordAgainstBreachWatch

Example:

Python CLI

Command: breachwatch password

Parameters:

  • passwords Input passwords to be scanned

Example:

Python SDK

Function: scan_passwords

BreachWatch Ignore

breachWatch ignore is a feature that allows users to suppress alerts or warnings for specific password records that have been flagged as weak, reused, or breached by Keeper's BreachWatch service.

This is useful when a user or admin acknowledges a password issue but decides not to take immediate action — for example, when a record is:

  • Used for legacy systems

  • Not critical or already protected by other means

  • Already being remediated

DotNet CLI

Command: breachwatch ignore

Example:

DotNet SDK

Function: IgnoreRecord

Example:

PowerCommander

Command: Set-KeeperBreachWatchRecordIgnore

Python CLI

Command: breachwatch ignore

Parameters:

  • records Record UIDs of records to be removed from breachwatch

Example:

Python SDK

Function: Not Supported

Last updated

Was this helpful?