Once Hackers have enough of your (meta) data, it can be reconstructed and will either help them make educated guesses or go for brute force as they have the time to do so.
HomeAssist is a tool that allows to make your home a lot smarter. But that is not its only function. You can use add-on's to enhance the feature-set. DNS, proxy, NTP are also very possible to manage with it. The reason I bring it up is that there is the 'Vaultwarden' add-on, which is a password manager. It is one that doesn't require the cloud. But as it is available to you in your home network, you can use it for many devices and do any kind of syncing when your devices are connected into your home network.
If you desire, you could also make your HomeAssistant instance accessible from outside your home network, so you could use your 'VaultWarden' setup also when your devices are outside your own network. Personally, I wouldn't go for such a setup, as one is usually at home when secure access to whatever service/software is required.
HomeAssistant is a project intended to be used in combination with the Raspberry 3 and 4 computing boards. But if you look well enough, you'll find that there is also an installer that works in a Linux VM or directly on an old computer. There is also a Docker-container of HomeAssist available, if that is more your thing. I elected to use a Linux VM inside my ProxMox environment and that works wonderfully well. I must add that there currently quite some add-ons installed, as well as HA keeping track of 10 security cameras (IP cams, 1080p) where I am figuring out how to use OpenAI for person recognition after motion is detected. I would not undertake those things with a Raspberry Pi.
Is HomeAssist with the 'VaultWarden' a good idea for anyone on the DC forum? I don't know. But it is worth a mention, as password managers do have their use. And if you are willing yo put a bit of effort into it and don't mention that you make use of it on social media, it should be a lot safer than having all those secrets permanently on cloud servers, which are under continuous attack from hackers.