This is a bit different. It's not a password manager app, it's more a standard for storing passwords encrypted with GPG in ~/.password-store and a reference CLI implementation. Several GUI clients exist to interact with the passwords, as well as tools to import from other password managers etc.
It sounds like a good idea, but I'm worried that a client could be at risk of a software supply chain attack - I don't think I will have the expertise to evaluate each new version.
Easy to use...for computer professionals. Try introducing pass to your family, even 1Password is not easy to set up for regular people. We have a long way to go before everyone is using passoword managers. The more realistic alternative is probably passkeys.
Note that pass by design leaks both the websites you have set up and the metadata of the history of each record. This might suit your threat model, or it might not.
That means I have access to your local machine if I can view your ~/.password-store directory. I might not be able to view or decrypt the contents of every entry, but I still have access to your machine.