| Dashlane | |
|---|---|
| | |
| Screenshot of Dashlane web app | |
| Developers | Dashlane, Inc. |
| Initial release | May 23, 2012 |
| Repository | github |
| Written in | Kotlin (Android) Swift (iOS) |
| Operating system | macOS, Windows, iOS, Android |
| Available in | 12 languages |
| Type | Password manager, digital wallet |
| License | Proprietary software |
| Website | www |
Dashlane is a subscription-based password manager and digital wallet application available on macOS, Windows, iOS and Android, founded in Paris. [1] Dashlane uses a subscription business model option. [2] [3]
Dashlane was founded in Paris on July 6, 2009, releasing their first software on May 23, 2012, that first included a password manager (encrypted using AES-256), [4] which was walled behind a single master password. Over time, more features were introduced to the product such as:
The source code for the Android and the iOS app is available under the Creative Commons NonCommercial license 4.0. [11] [12]
In 2017, Stiftung Warentest evaluated nine paid password managers and rated Dashlane Premium as one of four recommended products. [13]
A 2024 study by Fábrega et al. demonstrated that many popular password managers are vulnerable to injection attacks. Dashlane was affected due to its handling of application-wide security metrics, allowing an attacker to inject crafted shared entries and observe externally logged data (such as duplicate-password counts) to determine whether their injected values matched passwords stored in a victim’s vault. [14]
A 2024 study by Hutchinson et al. examined the “password checkup” features of 14 password managers, including Dashlane, using weak, breached, and randomly generated passwords. The authors found that the evaluated products reported weak and compromised passwords inconsistently and sometimes incompletely. No manager successfully flagged all known breached passwords. The study concludes that such inconsistencies may give users a false sense of security. [15]
Security researcher Marek Tóth presented a vulnerability in browser extensions of several password managers (including Dashlane) at DEF CON 33 on August 9, 2025. In their default configurations, these extensions were shown to be exposed to a DOM-based extension clickjacking technique, allowing attackers to exfiltrate user data with just a single click. [16] The affected password manager vendors were notified in April 2025. According to Tóth, Dashlane version 6.2531.1 (August 1, 2025) addressed the issue. [17]