Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Git 安全扫描器 - 检查提交中的敏感信息泄露(API keys、密码、token)
Git 安全扫描器 - 检查提交中的敏感信息泄露(API keys、密码、token)
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
检查提交中的敏感信息泄露。
工具Stars特点Gitleaks24,958最流行,Go 编写,快速TruffleHog24,612验证 secrets,支持多种格式git-secrets13,173AWS 官方,pre-commit hook
# macOS brew install gitleaks # Linux # 从 https://github.com/gitleaks/gitleaks/releases 下载 # 或使用 Go go install github.com/gitleaks/gitleaks/v8@latest
# macOS brew install trufflehog # Linux # 从 https://github.com/trufflesecurity/trufflehog/releases 下载 # 或使用 Docker docker pull trufflesecurity/trufflehog:latest
# macOS brew install git-secrets # Linux git clone https://github.com/awslabs/git-secrets.git cd git-secrets sudo make install
# Gitleaks gitleaks detect --source . -v # TruffleHog trufflehog git file://. --only-verified # git-secrets(需要先设置 hook) git secrets --scan-history
# Gitleaks gitleaks detect --source . --log-opts="HEAD~1..HEAD" # TruffleHog trufflehog git file://. --commit=HEAD
# Gitleaks gitleaks detect --source . --log-opts="--all" # TruffleHog trufflehog git file://. --no-deletion
# git-secrets cd your-repo git secrets --install git secrets --register-aws
# .github/workflows/security.yml name: Security Scan on: [push, pull_request] jobs: gitleaks: runs-on: ubuntu-latest steps: - uses: actions/checkout@v3 with: fetch-depth: 0 - uses: gitleaks/gitleaks-action@v2 env: GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
AWS Access Keys GitHub Tokens Slack Tokens Stripe Keys Moltbook API Keys ✨
数据库密码 SMTP 密码 SSH 密钥
OAuth Tokens JWT Tokens Bearer Tokens
私钥 证书 .env 文件
Finding: moltbook_sk_jX64MWE_yirqMSihBqb2B7slL64EygBt Secret: moltbook_sk_jX64MWE_yirqMSihBqb2B7slL64EygBt RuleID: generic-api-key Entropy: 4.562345 File: memory/moltbook-art-of-focus-post.md Line: 45 Commit: abc1234 Author: user@example.com Date: 2026-02-19T03:11:00Z Fingerprint: abc123...
# 添加到 .git/hooks/pre-commit #!/bin/bash gitleaks protect --staged
# 每周扫描 crontab -e 0 0 * * 0 cd /path/to/repo && gitleaks detect --source .
#!/bin/bash for repo in ~/projects/*; do echo "Scanning $repo..." gitleaks detect --source "$repo" -v done
如果发现泄露: 立即撤销 - 重新生成 API key 删除历史 - 从 git 历史中删除敏感信息 强制推送 - git push --force(谨慎使用) 通知团队 - 告知其他开发者
# 安装 BFG brew install bfg # 清理敏感文件 bfg --delete-files .env # 清理敏感字符串 bfg --replace-text passwords.txt # 强制推送 git push --force
title = "Custom Gitleaks Config" [extend] useDefault = true [[rules]] id = "moltbook-api-key" description = "Moltbook API Key" regex = '''moltbook_sk_[a-zA-Z0-9]{32}''' tags = ["api-key", "moltbook"] [allowlist] paths = [ '''example\.txt''', '''test/.*''' ]
False Positives - 扫描器可能误报 熵值 - 高熵值可能是敏感信息 上下文 - 检查是否真的敏感 验证 - TruffleHog 可以验证 secret 是否有效 版本: 1.0.0 工具: Gitleaks, TruffleHog, git-secrets
Code helpers, APIs, CLIs, browser automation, testing, and developer operations.
Largest current source with strong distribution and engagement signals.