← Back to list

secrets
by eriknovak
Home project
⭐ 0🍴 0📅 Jan 24, 2026
SKILL.md
name: secrets description: Audit codebase for secret handling issues. Scans for accidentally committed secrets, validates gitignore patterns, and ensures proper .env templates exist. user-invocable: true allowed-tools: Read, Bash(git:), Bash(grep:), Bash(find:*), Grep, Glob
Secrets Audit Skill
Audit your codebase for proper secret handling and identify potential security issues.
Usage
Ask Claude to audit secrets:
- "Check for leaked secrets"
- "Audit secret handling"
- "Are my secrets safe?"
- "Scan for credentials"
Or use the slash command: /secrets
What It Checks
1. Committed Secrets Detection
Scans git history and working tree for patterns that look like secrets:
- API keys (AWS, Google, Stripe, etc.)
- Tokens (JWT, OAuth, Bearer)
- Private keys (RSA, SSH, PGP)
- Passwords in config files
- Connection strings with credentials
2. Gitignore Validation
Verifies secret-related files are properly ignored:
.envand.env.*filescredentials.json,secrets.yaml- Private key files (
*.pem,*.key) - Cloud config (
~/.aws/credentials)
3. Template Verification
Ensures proper secret management patterns:
.env.exampleexists when.envis used- Template has all required keys (without values)
- Documentation for required secrets
4. Hardcoded Secret Detection
Scans source code for hardcoded credentials:
- String patterns matching secret formats
- Base64-encoded potential secrets
- URLs with embedded credentials
Output
The skill provides:
- Issues Found: List of potential secret exposures
- Risk Level: Critical, High, Medium, Low
- Recommendations: Specific fixes for each issue
- Best Practices: General guidance for the project
Example Output
=== Secrets Audit Report ===
CRITICAL: Found potential AWS key in src/config.js:42
Pattern: AKIA[0-9A-Z]{16}
Action: Rotate key immediately, remove from git history
HIGH: .env file not in .gitignore
File: .env
Action: Add to .gitignore, verify not committed
MEDIUM: Missing .env.example template
Action: Create .env.example with required keys (no values)
LOW: Using environment variables correctly
Files: src/db.js, src/api.js
=== Recommendations ===
1. Run: git filter-branch to remove secrets from history
2. Add comprehensive .gitignore patterns
3. Use secret manager for production (Vault, AWS Secrets Manager)
Limitations
- Cannot detect secrets in binary files
- Pattern matching may have false positives
- Does not check external secret managers
- Git history scan limited to recent commits by default
Related
block-secrets.shhook prevents Claude from reading secret files- See reference.md for detailed patterns and remediation steps
Score
Total Score
55/100
Based on repository quality metrics
✓SKILL.md
SKILL.mdファイルが含まれている
+20
○LICENSE
ライセンスが設定されている
0/10
○説明文
100文字以上の説明がある
0/10
○人気
GitHub Stars 100以上
0/15
✓最近の活動
3ヶ月以内に更新
+5
○フォーク
10回以上フォークされている
0/5
✓Issue管理
オープンIssueが50未満
+5
✓言語
プログラミング言語が設定されている
+5
✓タグ
1つ以上のタグが設定されている
+5
Reviews
💬
Reviews coming soon
