Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Scans files, repos, and directories for leaked secrets — API keys, tokens, passwords, connection strings, private keys, and credentials. Detects 40+ secret p...
Scans files, repos, and directories for leaked secrets — API keys, tokens, passwords, connection strings, private keys, and credentials. Detects 40+ secret p...
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.
Security skill that scans code, config files, and repos for accidentally leaked secrets and credentials.
Use this skill when the user: Asks to "check for leaked secrets" or "scan for API keys" Wants to audit a repo or folder before committing or publishing Says "are there any hardcoded passwords in this code?" Asks to "find credentials" or "check for exposed tokens" Wants pre-commit or pre-publish security checks Mentions concern about accidentally checking in secrets
Detect 40+ secret patterns including: AWS Access Keys, Secret Keys, Session Tokens Azure Storage Keys, Connection Strings, SAS Tokens GCP Service Account Keys, API Keys GitHub / GitLab / Bitbucket Personal Access Tokens OpenAI, Anthropic, Hugging Face API Keys Slack Bot Tokens, Webhooks Stripe, Twilio, SendGrid Keys Database connection strings (MongoDB, PostgreSQL, MySQL, Redis) SSH Private Keys, PEM/PFX Certificates JWT Tokens, Bearer Tokens Generic passwords in config files (password=, secret=, token=) Scan individual files, directories, or entire repos recursively Ignore binary files, node_modules, .git, and other non-relevant paths Output results as Markdown report or JSON Provide severity ratings (Critical, High, Medium, Low) Suggest remediation for each finding
python secret_scanner.py /path/to/project
python secret_scanner.py /path/to/project --json
python secret_scanner.py /path/to/project --output report.md
"Scan this project for leaked secrets" "Check if there are any API keys in the codebase" "Run secret-scanner on the current directory" "Find hardcoded passwords in my config files" "Audit this repo before I push to GitHub"
ProviderSecrets DetectedAWSAccess Key ID (AKIA...), Secret Access Key, Session TokenAzureStorage Account Key, Connection String, SAS Token, Client SecretGCPAPI Key (AIza...), Service Account JSON, OAuth Client Secret
ServicePatternOpenAIsk- prefixed API keysAnthropicsk-ant- prefixed keysHugging Facehf_ prefixed tokensCohereAPI keys in config
PlatformSecrets DetectedGitHubghp_, gho_, ghu_, ghs_, ghr_ tokensGitLabglpat- tokensSlackxoxb-, xoxp-, xoxs- tokens, webhook URLsStripesk_live_, sk_test_, rk_live_ keysTwilioAccount SID, Auth TokenSendGridSG. prefixed API keys
TypePatternMongoDBmongodb:// or mongodb+srv:// with credentialsPostgreSQLpostgresql:// with embedded passwordMySQLmysql:// with embedded passwordRedisredis:// with passwordSSH-----BEGIN (RSA|EC|OPENSSH) PRIVATE KEY-----CertificatesPEM, PFX, P12 with embedded keys
PatternDescriptionpassword=Hardcoded passwords in config/env filessecret=Hardcoded secretstoken=Hardcoded tokensBearerBearer tokens in codeBasic AuthBase64-encoded basic auth headersJWTeyJ prefixed JWT tokensHigh EntropyLong random strings that look like secrets
SeverityDescriptionExamples🔴 CriticalActive production credentialsAWS Secret Key, Private Keys, DB passwords🟠 HighService tokens with broad accessGitHub PAT, Slack Bot Token, Stripe Live Key🟡 MediumKeys that may be test/devTest API keys, example tokens🟢 LowPotential false positivesGeneric password= in comments, placeholder values
Scans these file types by default: Source code: .py, .js, .ts, .java, .go, .rb, .php, .cs, .rs Config: .json, .yaml, .yml, .toml, .ini, .cfg, .conf Environment: .env, .env.local, .env.production Shell: .sh, .bash, .zsh, .ps1 Docs: .md, .txt Other: Dockerfile, docker-compose.yml, Makefile
Automatically skips: node_modules/, vendor/, venv/, .venv/ .git/, .svn/ __pycache__/, .pytest_cache/ Binary files, images, compiled outputs package-lock.json, yarn.lock
When secrets are found, the skill recommends: Rotate the secret immediately — assume it's compromised Remove from code — use environment variables or a secrets manager instead Add to .gitignore — prevent .env and credential files from being committed Use git-filter-repo — to remove secrets from git history Enable pre-commit hooks — to catch secrets before they're committed
Python 3.7+ No additional dependencies (uses Python standard library)
CLI: secret_scanner.py
#security #secrets #credentials #api-keys #tokens #passwords #scanner #audit #pre-commit #leak-detection #cloud #aws #azure #gcp #devops
Code helpers, APIs, CLIs, browser automation, testing, and developer operations.
Largest current source with strong distribution and engagement signals.