BreachWatch Commands

This page shows commands related to BreachWatch and their responses.

Overview

BreachWatch is a powerful, secure add-on feature that monitors the internet and dark web for breached accounts matching records stored within your Keeper Vault. BreachWatch delivers the most in-depth monitoring available to the public with a database of over a billion records while upholding Keeper's state-of-the-art, zero-knowledge security architecture. More details can be found here.

User Experience

To sign up for BreachWatch from Keeper's Web Vault or mobile app, navigate to the BreachWatch screen and follow the on-screen prompts. You can also purchase BreachWatch directly from the Keeper Security websitearrow-up-right. After signup, BreachWatch performs a local scan of passwords that are currently stored in your Keeper vault.

BreachWatch Supports 4 Commands in SDK.

BreachWatch List

The breachwatch list command lists Keeper Vault records and their associated password breach status as detected by the BreachWatch service. It helps identify weak, reused, or breached passwords in your vault.

chevron-rightDotNet CLIhashtag

Command: breachwatch list

Flags:

  • — numbered: This flag displays breachwatch records in a serial numbered order

  • — owned: This flag displays breachwatch records which belong to the owner

  • — all: This flag displays breachwatch record which the current user has access to. There can be both owned records and records which are shared to user which have a different owner.

Example:

My Vault> breachwatch list --numbered --owned
S.No  Record UID              Title                      Description        
----  ----------------------  -------------------------  -------------------
2     record_uid              DemoRecordForWeakPassword  [email protected]      
1     record_uid              breachwatchIgnoreTest3     [email protected]
3     record_uid              DemoBreachWatchRecord      
chevron-rightDotNet SDKhashtag

Function: BreachWatchRecords()

The below call can be made provided that vault is initiated and synced.

Example:

chevron-rightPowerCommanderhashtag

Command: Get-KeeperBreachWatchList

Flags:

Example:

chevron-rightPython CLIhashtag

Command: breachwatch list

Options:

  • -n --numbered Displayed records as a numbered list

  • -a --all Display all breached records (default - first 30 records)

  • -o --owned Display only breached records owned by user

Example:

chevron-rightPython SDKhashtag

Function: breach_watch_records

BreachWatch Scan

The breachwatch scan command is used to submit newly created or updated passwords in your vault for BreachWatch scanning. This scan detects whether the password is reused, weak, or compromised.

Use it after creating or modifying records with passwords, especially if they were added outside of Keeper apps (e.g., via: Commander CLI, API scripts etc).

chevron-rightDotNet CLIhashtag

Command: breachwatch scan

Example:

chevron-rightDotNet SDKhashtag

Function: ScanAndStoreRecordStatusAsync

This function requires record Uids as a list of string

Example:

chevron-rightPowerCommanderhashtag

Command: Not Supported

chevron-rightPython CLIhashtag

Command: breachwatch scan

Parameters:

  • -r --records Record UIDs to be scanned

Example:

chevron-rightPython SDKhashtag

Function: scan_and_store_record_status

BreachWatch Password

breachWatch password is a Keeper security feature that continuously monitors your stored vault passwords for exposure in public data breaches. It analyses passwords using zero-knowledge encryption to determine if they are Safe or not.

chevron-rightDotNet CLIhashtag

Command: breachwatch password

Example:

chevron-rightDotNet SDKhashtag

Function: ScanPasswordsAsync Example:

chevron-rightPowerCommanderhashtag

Command: Test-PasswordAgainstBreachWatch

Example:

chevron-rightPython CLIhashtag

Command: breachwatch password

Parameters:

  • passwords Input passwords to be scanned

Example:

chevron-rightPython SDKhashtag

Function: scan_passwords

BreachWatch Ignore

breachWatch ignore is a feature that allows users to suppress alerts or warnings for specific password records that have been flagged as weak, reused, or breached by Keeper's BreachWatch service.

This is useful when a user or admin acknowledges a password issue but decides not to take immediate action — for example, when a record is:

  • Used for legacy systems

  • Not critical or already protected by other means

  • Already being remediated

chevron-rightDotNet CLIhashtag

Command: breachwatch ignore

Example:

chevron-rightDotNet SDKhashtag

Function: IgnoreRecord

Example:

chevron-rightPowerCommanderhashtag

Command: Set-KeeperBreachWatchRecordIgnore

chevron-rightPython CLIhashtag

Command: breachwatch ignore

Parameters:

  • records Record UIDs of records to be removed from breachwatch

Example:

chevron-rightPython SDKhashtag

Function: Not Supported

Last updated

Was this helpful?