Hello everyone. I’m new to the forum. I’d like to ask you to share your thoughts on a topic I’ve been researching for a while. When transferring passwords from the password manager application to the password fill field in the target application, methods such as using a clipboard, using the click-to-fill method with a password manager browser extension, or manually typing the password after displaying it on the screen are all possible. Each has its own unique threat profile and should be evaluated based on the individual threat model.
Using a clipboard is particularly unsafe from a security perspective on Windows or Linux systems running the X11 Protocol. Whether malicious or not, any application can monitor the clipboard through simple API calls. This is arguably the highest threat level password transfer method. Furthermore, a malicious JavaScript script on a website could listen to copied text with the paste event.
Using the click-to-fill method with Password Manager Browser Extensions is generally more secure because it doesn’t use the clipboard. However, factors such as XSS vulnerabilities and clickjacking attacks reported in the past raise questions about the security of add-ons due to the general security weaknesses of browsers. Furthermore, because add-ons represent an additional layer of software, they are more susceptible to supply-chain risks, albeit very unlikely.
The final and most tedious method is to observe the passwords on the screen and manually type them into the appropriate field in the target window. This is vulnerable to screen capturing or keylogger attacks.
Another method not mentioned here is the autotype method, but this is not supported by every password manager and cannot be used in a Wayland environment. I am looking for a common solution for both Linux systems running the Wayland protocol and Windows systems.
Regarding the threat model, I intend to create a low threat surface for any user. Regardless of my personal needs, I’m curious about what users with a high threat model should use and am conducting research on this. Could you please help me with your knowledge? Which method do you find more secure? Thank you very much.