Your main question seems to be whether it is possible to regenerate the values derived by BIP-85 (child seed, WIF, passwords) without a coldcard... the answer is yes.
BIP-85 is available on other hardware wallets such as Passport2, bitbox02, Jade, and more. You can check the full list of supported devices here:
https://thebitcoinhole.com/hardware-wallets.
However, coldcard is the only one that supports BIP-85 passwords (I've heard that Passport2 and Krux have BIP-85 passwords, it would be good if someone showed a screenshot of the feature to update
my topic).
But even if you don't have any of these hardware, you can still use BIP-85 with these tools:
Ian Coleman BIP39 and
bitcoiner.guide/seed (this one includes BIP-85 Passwords support)
To reinforce nc50lc’s response, if you derive BIP-85 values from your master seed, do it in a 100% offline and air-gapped environment that will never be connected to the internet again. There is no need to expose your original seed elsewhere.
You can generate a child seed to test in other environments, because naturally, it is not possible to reverse engineer the child key's xpriv to get to the original value, which is your master seed. This is the security of BIP-85, knowing how to use it.
Obviously, generate your child seeds on coldcard first, we don't want to compromise the parent seed.
If you plan to test the tools i mentioned (
ian coleman or
bitcoiner.guide/seed), they work online, but the .html page also works offline, which is the correct way to use them, unless you're just playing around and testing without exposing any master seed from your cold storage or any child seed with real funds.
In any case, if you decide to use them offline, download the .html file or clone it directly from github and verify the signatures of the downloaded files to ensure you have obtained the original files!
I won’t go into too much detail here, but if you want to learn more about BIP-85, i created a
dedicated thread with the best references i could find on the web.