{
  "schemaVersion": "1.0",
  "item": {
    "slug": "secret-detection",
    "name": "Secret Detection",
    "source": "tencent",
    "type": "skill",
    "category": "开发工具",
    "sourceUrl": "https://clawhub.ai/Derick001/secret-detection",
    "canonicalUrl": "https://clawhub.ai/Derick001/secret-detection",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadMode": "redirect",
    "downloadUrl": "/downloads/secret-detection",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=secret-detection",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "installMethod": "Manual import",
    "extraction": "Extract archive",
    "prerequisites": [
      "OpenClaw"
    ],
    "packageFormat": "ZIP package",
    "includedAssets": [
      "README.md",
      "SKILL.md",
      "scripts/main.py",
      "tests/test_secret_detection.py"
    ],
    "primaryDoc": "SKILL.md",
    "quickSetup": [
      "Download the package from Yavira.",
      "Extract the archive and review SKILL.md first.",
      "Import or place the package into your OpenClaw setup."
    ],
    "agentAssist": {
      "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
      "steps": [
        "Download the package from Yavira.",
        "Extract it into a folder your agent can access.",
        "Paste one of the prompts below and point your agent at the extracted folder."
      ],
      "prompts": [
        {
          "label": "New install",
          "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete."
        },
        {
          "label": "Upgrade existing",
          "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run."
        }
      ]
    },
    "sourceHealth": {
      "source": "tencent",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-05-07T17:22:31.273Z",
      "expiresAt": "2026-05-14T17:22:31.273Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=afrexai-annual-report",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=afrexai-annual-report",
        "contentDisposition": "attachment; filename=\"afrexai-annual-report-1.0.0.zip\"",
        "redirectLocation": null,
        "bodySnippet": null
      },
      "scope": "source",
      "summary": "Source download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this source.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/secret-detection"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    },
    "downloadPageUrl": "https://openagent3.xyz/downloads/secret-detection",
    "agentPageUrl": "https://openagent3.xyz/skills/secret-detection/agent",
    "manifestUrl": "https://openagent3.xyz/skills/secret-detection/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/secret-detection/agent.md"
  },
  "agentAssist": {
    "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
    "steps": [
      "Download the package from Yavira.",
      "Extract it into a folder your agent can access.",
      "Paste one of the prompts below and point your agent at the extracted folder."
    ],
    "prompts": [
      {
        "label": "New install",
        "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete."
      },
      {
        "label": "Upgrade existing",
        "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run."
      }
    ]
  },
  "documentation": {
    "source": "clawhub",
    "primaryDoc": "SKILL.md",
    "sections": [
      {
        "title": "What This Does",
        "body": "This skill provides a git pre‑commit hook that scans staged files for common secret patterns (API keys, passwords, tokens) and blocks the commit if any are found. It helps prevent accidental leakage of secrets to public repositories.\n\nInputs: Git staged files (automatically scanned by the hook) or manual file paths.\nOutputs: Detection report with line numbers; non‑zero exit code if secrets found."
      },
      {
        "title": "When To Use",
        "body": "Use this skill when:\n\nYou work with repositories that may contain sensitive credentials\nYou want to prevent accidental commits of secrets\nYou need a lightweight, local secret scanner for git workflows\nYou want to enforce security checks before pushing to remote"
      },
      {
        "title": "Installation",
        "body": "# Install the hook in your git repository\n./scripts/main.py install"
      },
      {
        "title": "Manual Scan",
        "body": "# Scan specific files\n./scripts/main.py scan --file path/to/file\n\n# Scan all staged files (like the hook does)\n./scripts/main.py scan --staged"
      },
      {
        "title": "Hook Behavior",
        "body": "The hook runs automatically on git commit\nIf secrets are detected, the commit is blocked\nThe script prints the detected secrets with file names and line numbers\nExit code 0 = no secrets found; exit code 1 = secrets found"
      },
      {
        "title": "Example 1: Installing the Hook",
        "body": "$ ./scripts/main.py install\n✓ Pre-commit hook installed at .git/hooks/pre-commit\n✓ Hook will scan for secrets on every commit"
      },
      {
        "title": "Example 2: Secret Detection Blocking a Commit",
        "body": "$ git commit -m \"Add config\"\n⚠️  Secret detected in config.yaml line 12: AWS_ACCESS_KEY_ID=AKIA...\n⚠️  Secret detected in .env line 3: PASSWORD=secret123\n✗ Commit blocked: 2 secrets found"
      },
      {
        "title": "Example 3: Manual Scan",
        "body": "$ ./scripts/main.py scan --staged\nScanning 3 staged files...\n✓ config.yaml: clean\n✓ .env: clean  \n✓ src/main.py: clean\n✓ No secrets found"
      },
      {
        "title": "Requirements",
        "body": "Git (for hook installation)\nPython 3.6+ (for the scanner)\nNo external API keys or services needed"
      },
      {
        "title": "Limitations",
        "body": "Only detects common secret patterns (AWS keys, GitHub tokens, passwords, etc.)\nMay produce false positives (e.g., long random strings that aren't actually secrets)\nDoes not scan binary files\nRequires manual installation per repository\nDoes not replace comprehensive secret‑management solutions\nPrints first 20 characters of detected secrets to console for identification purposes"
      }
    ],
    "body": "Secret Detection\nWhat This Does\n\nThis skill provides a git pre‑commit hook that scans staged files for common secret patterns (API keys, passwords, tokens) and blocks the commit if any are found. It helps prevent accidental leakage of secrets to public repositories.\n\nInputs: Git staged files (automatically scanned by the hook) or manual file paths.\nOutputs: Detection report with line numbers; non‑zero exit code if secrets found.\n\nWhen To Use\n\nUse this skill when:\n\nYou work with repositories that may contain sensitive credentials\nYou want to prevent accidental commits of secrets\nYou need a lightweight, local secret scanner for git workflows\nYou want to enforce security checks before pushing to remote\nUsage\nInstallation\n# Install the hook in your git repository\n./scripts/main.py install\n\nManual Scan\n# Scan specific files\n./scripts/main.py scan --file path/to/file\n\n# Scan all staged files (like the hook does)\n./scripts/main.py scan --staged\n\nHook Behavior\nThe hook runs automatically on git commit\nIf secrets are detected, the commit is blocked\nThe script prints the detected secrets with file names and line numbers\nExit code 0 = no secrets found; exit code 1 = secrets found\nExamples\nExample 1: Installing the Hook\n$ ./scripts/main.py install\n✓ Pre-commit hook installed at .git/hooks/pre-commit\n✓ Hook will scan for secrets on every commit\n\nExample 2: Secret Detection Blocking a Commit\n$ git commit -m \"Add config\"\n⚠️  Secret detected in config.yaml line 12: AWS_ACCESS_KEY_ID=AKIA...\n⚠️  Secret detected in .env line 3: PASSWORD=secret123\n✗ Commit blocked: 2 secrets found\n\nExample 3: Manual Scan\n$ ./scripts/main.py scan --staged\nScanning 3 staged files...\n✓ config.yaml: clean\n✓ .env: clean  \n✓ src/main.py: clean\n✓ No secrets found\n\nRequirements\nGit (for hook installation)\nPython 3.6+ (for the scanner)\nNo external API keys or services needed\nLimitations\nOnly detects common secret patterns (AWS keys, GitHub tokens, passwords, etc.)\nMay produce false positives (e.g., long random strings that aren't actually secrets)\nDoes not scan binary files\nRequires manual installation per repository\nDoes not replace comprehensive secret‑management solutions\nPrints first 20 characters of detected secrets to console for identification purposes"
  },
  "trust": {
    "sourceLabel": "tencent",
    "provenanceUrl": "https://clawhub.ai/Derick001/secret-detection",
    "publisherUrl": "https://clawhub.ai/Derick001/secret-detection",
    "owner": "Derick001",
    "version": "1.0.0",
    "license": null,
    "verificationStatus": "Indexed source record"
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/secret-detection",
    "downloadUrl": "https://openagent3.xyz/downloads/secret-detection",
    "agentUrl": "https://openagent3.xyz/skills/secret-detection/agent",
    "manifestUrl": "https://openagent3.xyz/skills/secret-detection/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/secret-detection/agent.md"
  }
}