Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Detect 500+ types of hardcoded secrets (API keys, credentials, tokens) before they leak into git. Wraps GitGuardian's ggshield CLI.
Detect 500+ types of hardcoded secrets (API keys, credentials, tokens) before they leak into git. Wraps GitGuardian's ggshield CLI.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.
ggshield is a CLI tool that detects hardcoded secrets in your codebase. This Moltbot skill brings secret scanning capabilities to your AI agent.
Secrets are sensitive credentials that should NEVER be committed to version control: AWS Access Keys, GCP Service Accounts, Azure credentials API tokens (GitHub, Slack, Stripe, etc.) Database passwords and connection strings Private encryption keys and certificates OAuth tokens and refresh tokens PayPal/Stripe API keys Email server credentials
A single leaked secret can: ๐ Compromise your infrastructure ๐ธ Incur massive cloud bills (attackers abuse your AWS account) ๐ Expose customer data (GDPR/CCPA violation) ๐จ Trigger security incidents and audits ggshield catches these before they reach your repository.
ggshield CLI: Install via pip pip install ggshield>=1.15.0 GitGuardian API Key: Required for secret detection Sign up: https://dashboard.gitguardian.com (free) Generate API key in Settings Set environment variable: export GITGUARDIAN_API_KEY="your-api-key-here" Python 3.8+: Required by ggshield
clawdhub install ggshield-scanner The skill is now available in your Moltbot workspace.
Start a new Moltbot session to pick up the skill: moltbot start # or via messaging: @clawd list-skills
Dev: @clawd scan-repo . Moltbot: โ Repository clean. All good to push! Dev: git push
Dev: @clawd scan-repo ~/my-old-project Moltbot: โ Found 5 secrets in history! - AWS keys in config/secrets.json - Database password in docker-compose.yml - Slack webhook in .env.example Moltbot: Recommendation: Rotate these credentials immediately. Consider using git-filter-repo to remove from history.
Dev: @clawd install-hooks Moltbot: โ Installed pre-commit hook Dev: echo "SECRET_TOKEN=xyz" > config.py Dev: git add config.py Dev: git commit -m "Add config" Moltbot: โ Pre-commit hook detected secret! Dev: rm config.py && git reset Dev: (add config to .gitignore and to environment variables instead) Dev: git commit -m "Add config" # Now works!
Dev: @clawd scan-docker my-api:v1.2.3 Moltbot: โ Docker image clean
These are required for the skill to work: VariableValueWhere to SetGITGUARDIAN_API_KEYYour API key from https://dashboard.gitguardian.com~/.bashrc or ~/.zshrcGITGUARDIAN_ENDPOINThttps://api.gitguardian.com (default, optional)Usually not needed
Create ~/.gitguardian/.gitguardian.yml for persistent settings: verbose: false output-format: json exit-code: true For details: https://docs.gitguardian.com/ggshield-docs/
โ ONLY metadata is sent: Hash of the secret pattern (not the actual secret) File path (relative path only) Line number โ NEVER sent: Your actual secrets or credentials File contents Private keys Credentials Reference: GitGuardian Enterprise customers can use on-premise scanning with no data sent anywhere.
ggshield uses: Entropy-based detection: Identifies high-entropy strings (random tokens) Pattern matching: Looks for known secret formats (AWS key prefixes, etc.) Public CVEs: Cross-references disclosed secrets Machine learning: Trained on leaked secrets database
ggshield is not installed or not in your PATH. Fix: pip install ggshield which ggshield # Should return a path
The environment variable is not set. Fix: export GITGUARDIAN_API_KEY="your-key" # For persistence, add to ~/.bashrc or ~/.zshrc: echo 'export GITGUARDIAN_API_KEY="your-key"' >> ~/.bashrc source ~/.bashrc
API key is invalid or expired. Fix: # Test the API key ggshield auth status # If invalid, regenerate at https://dashboard.gitguardian.com โ API Tokens # Then: export GITGUARDIAN_API_KEY="new-key"
Scanning a 50GB monorepo takes time. ggshield is doing a lot of work. Workaround: # Scan only staged changes (faster): @clawd scan-staged # Or specify a subdirectory: @clawd scan-file ./app/config.py
Sometimes ggshield flags a string that's NOT a secret (e.g., a test key): # Ignore the last secret found ggshield secret ignore --last-found # Ignore all in a file ggshield secret ignore --path ./config-example.py This creates .gitguardian/config.json with ignore rules.
You can add secret scanning to GitHub Actions / GitLab CI: # .github/workflows/secret-scan.yml name: Secret Scan on: [push] jobs: scan: runs-on: ubuntu-latest steps: - uses: actions/checkout@v3 - run: pip install ggshield - run: ggshield secret scan repo . env: GITGUARDIAN_API_KEY: ${{ secrets.GITGUARDIAN_API_KEY }}
If your company uses GitGuardian Enterprise, you can scan without sending data to the cloud: export GITGUARDIAN_ENDPOINT="https://your-instance.gitguardian.com" export GITGUARDIAN_API_KEY="your-enterprise-key"
ggshield Documentation: https://docs.gitguardian.com/ggshield-docs/ GitGuardian Dashboard: https://dashboard.gitguardian.com (view all secrets found) Moltbot Skills: https://docs.molt.bot/tools/clawdhub Secret Management Best Practices: https://cheatsheetseries.owasp.org/cheatsheets/Secrets_Management_Cheat_Sheet.html
Bug reports: https://github.com/GitGuardian/ggshield-skill/issues Questions: Open an issue or comment on ClawdHub ggshield issues: https://github.com/GitGuardian/ggshield/issues
MIT License - See LICENSE file
GitGuardian Team [Your contributions welcome!] Version: 1.0.0 Last updated: January 2026 Maintainer: GitGuardian
Code helpers, APIs, CLIs, browser automation, testing, and developer operations.
Largest current source with strong distribution and engagement signals.