Unfortunately, I don't think it will work.
The "load_device" command will allow you to load the mnemonic or xprv...
Usage: trezorctl load_device [OPTIONS]
Load custom configuration to the device.
Options:
-m, --mnemonic TEXT
-e, --expand
-x, --xprv TEXT
-p, --pin TEXT
-r, --passphrase-protection
-l, --label TEXT
-i, --ignore-checksum
-s, --slip0014
--help Show this message and exit.
but there is no command that you can issue that will cough up private keys etc... The best I can see is
get_address, command which will return an address for a specified coin type and derivation path, but I don't see a way to get the private key data...
Usage: trezorctl get_address [OPTIONS]
Get address for specified path.
Options:
-c, --coin TEXT
-n, --address TEXT BIP-32 path, e.g. m/44'/0'/0'/0/0
[required]
-t, --script-type [address|segwit|p2shsegwit]
-d, --show-display
--help Show this message and exit.
Only the "pubkey" using
get_public_node:
Usage: trezorctl get_public_node [OPTIONS]
Get public node of given path.
Options:
-c, --coin TEXT
-n, --address TEXT BIP-32 path, e.g. m/44'/0'/0' [required]
-e, --curve TEXT
-d, --show-display
--help Show this message and exit.
which returns the following:
node.public_key: 03edc955f8d1d49d6fdc11c183063f58320c969c7b5d7e6f5705523b9ef19bbd24
node.depth: 2
node.chain_code: 7551a39e04e7fa60643409a92f5135240673c0a2ddf4970bd14ee22f6a953945
node.child_num: 0
node.fingerprint: df26a6b1
xpub: xpub6BQmKf6WWF63QP6zTEZF4cmbdfS7ziZWh3NECMeV69cFhD2u3aMZPb9ptVy8g1zx9WYwRMNzkxDs7s2vHiXyaGtagcy26XSXyk5vXC2838q