Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Scan workspace files for leaked secrets: API keys, tokens, passwords, private keys, and credentials. Detects AWS, GitHub, Slack, Stripe, OpenAI, Anthropic, Google, Azure keys and more. Free alert layer — upgrade to openclaw-sentry-pro for automated redaction, quarantine, and defense.
Scan workspace files for leaked secrets: API keys, tokens, passwords, private keys, and credentials. Detects AWS, GitHub, Slack, Stripe, OpenAI, Anthropic, Google, Azure keys and more. Free alert layer — upgrade to openclaw-sentry-pro for automated redaction, quarantine, and defense.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.
Scans your agent workspace for leaked secrets — API keys, tokens, passwords, private keys, and credentials that should never be in plain text.
Agent workspaces accumulate secrets: API keys in config files, tokens in memory logs, passwords in environment files. A single leaked credential can compromise your entire infrastructure. Existing secret scanners work on git repos — nothing watches the agent workspace itself.
Scan all workspace files for secrets and high-risk files. python3 {baseDir}/scripts/sentry.py scan --workspace /path/to/workspace
Check a specific file for secrets. python3 {baseDir}/scripts/sentry.py check MEMORY.md --workspace /path/to/workspace
One-line summary of secret exposure risk. python3 {baseDir}/scripts/sentry.py status --workspace /path/to/workspace
ProviderPatternsAWSAccess keys (AKIA...), secret keysGitHubPATs (ghp_, gho_, ghs_, ghr_, github_pat_)SlackBot/user tokens (xox...), webhooksStripeSecret keys (sk_live_), publishable keysOpenAIAPI keys (sk-...)AnthropicAPI keys (sk-ant-...)GoogleAPI keys (AIza...), OAuth secretsAzureStorage account keysGenericAPI keys, secrets, passwords, bearer tokens, connection stringsCryptoPEM private keys, .key/.pem/.p12 filesDatabasePostgreSQL/MySQL/MongoDB/Redis URLs with credentialsJWTJSON Web TokensEnvironment.env files with variables
0 — Clean, no secrets found 1 — Warnings (high-risk files detected) 2 — Critical secrets found
Python standard library only. No pip install. No network calls. Everything runs locally.
Works with OpenClaw, Claude Code, Cursor, and any tool using the Agent Skills specification.
Workflow acceleration for inboxes, docs, calendars, planning, and execution loops.
Largest current source with strong distribution and engagement signals.