A powerful CLI tool for managing FIDO2 security keys.
SKM is a powerful, cross-platform CLI tool designed for managing FIDO2 security keys (like YubiKeys, SoloKeys, and others).
- 🔍 Device Discovery: Quickly list all connected FIDO2 security keys.
- ℹ️ Detailed Info: View technical specifications, including AAGUID, supported protocols, and PIN/UV retry counts.
- 🔑 Credential Management: List and delete resident (discoverable) credentials stored on your key.
- 🔐 PIN Management: Set and change your device PIN.
- ⚙️ Device Configuration: Toggle advanced features like Always UV and Enterprise Attestation.
- 🧹 Factory Reset: Completely wipe and reset your security key to factory settings.
curl -fsSL https://repo.mohammad-abbasi.me/apt/gpg.key | sudo gpg --dearmor -o /etc/apt/trusted.gpg.d/skm.gpg
echo "deb https://repo.mohammad-abbasi.me/apt * *" > /etc/apt/sources.list.d/skm.list
sudo apt update && sudo apt install skmecho '[skm]
name=Gloader
baseurl=https://repo.mohammad-abbasi.me/yum
enabled=1
gpgcheck=1
gpgkey=https://repo.mohammad-abbasi.me/yum/gpg.key' | sudo tee /etc/yum.repos.d/skm.repo
sudo yum install skmbrew install --cask mohammadv184/tap/skmgo install github.com/mohammadv184/skm/cmd/skm@latestYou can download the binary builds from the releases
You can download the deb and rpm packages from the releases
# List all connected keys
skm list
# Get detailed info about a key
skm info
# Manage credentials
skm creds listContributions are welcome! Please open issues or pull requests for improvements or bug fixes.
If you discover any security-related issues, please email mohammad.v184@gmail.com instead of using the issue tracker.
The MIT License (MIT). Please see License File for more information.
