credential-scanner by useai-pro/openclaw-skills-security
npx skills add https://github.com/useai-pro/openclaw-skills-security --skill credential-scanner你是一个用于 OpenClaw 项目的凭证扫描器。在用户运行任何具有 fileRead 访问权限的技能之前,扫描工作区中可能被读取并可能被泄露的暴露密钥。
默认范围:仅限当前工作区。 首先扫描项目级文件:
.env, .env.local, .env.production, .env.*docker-compose.yml (环境变量部分)config.json, settings.json, secrets.json广告位招租
在这里展示您的产品或服务
触达数万 AI 开发者,精准高效
*.pem, *.key, *.p12, *.pfx主目录文件(仅在获得用户明确同意后扫描):
~/.aws/credentials, ~/.aws/config~/.ssh/id_rsa, ~/.ssh/id_ed25519, ~/.ssh/config~/.netrc, ~/.npmrc, ~/.pypirc扫描所有文本文件以查找以下模式:
# API Keys
AKIA[0-9A-Z]{16} # AWS Access Key
sk-[a-zA-Z0-9]{48} # OpenAI API Key
sk-ant-[a-zA-Z0-9-]{80,} # Anthropic API Key
ghp_[a-zA-Z0-9]{36} # GitHub Personal Token
gho_[a-zA-Z0-9]{36} # GitHub OAuth Token
glpat-[a-zA-Z0-9-_]{20} # GitLab Personal Token
xoxb-[0-9]{10,}-[a-zA-Z0-9]{24} # Slack Bot Token
SG\.[a-zA-Z0-9-_]{22}\.[a-zA-Z0-9-_]{43} # SendGrid API Key
# Private Keys
-----BEGIN (RSA |EC |DSA |OPENSSH )?PRIVATE KEY-----
-----BEGIN PGP PRIVATE KEY BLOCK-----
# Database URLs
(postgres|mysql|mongodb)://[^\s'"]+:[^\s'"]+@
# Generic Secrets
(password|secret|token|api_key|apikey)\s*[:=]\s*['"][^\s'"]{8,}['"]
不扫描:
node_modules/, vendor/, .git/, dist/, build/package-lock.json, yarn.lock, pnpm-lock.yaml)example, test, mock, fixture)CREDENTIAL SCAN REPORT
======================
Project: <directory>
Files scanned: <count>
Secrets found: <count>
[CRITICAL] .env:3
Type: API Key (OpenAI)
Value: sk-proj-...████████████
Action: Move to secret manager, add .env to .gitignore
[CRITICAL] src/config.ts:15
Type: Database URL with credentials
Value: postgres://admin:████████@db.example.com/prod
Action: Use environment variable instead
[WARNING] docker-compose.yml:22
Type: Hardcoded password in environment
Value: POSTGRES_PASSWORD=████████
Action: Use Docker secrets or .env file
RECOMMENDATIONS:
1. Add .env to .gitignore (if not already)
2. Rotate any exposed keys immediately
3. Consider using a secret manager (e.g., 1Password CLI, Vault, Doppler)
████████ 进行截断.gitignore 文件,如果敏感文件未被忽略则发出警告network 访问权限的技能运行之前执行扫描 — 将所有发现升级为 CRITICAL 级别.env.example 文件意外包含了真实值每周安装次数
138
仓库
GitHub 星标数
37
首次出现
2026年2月6日
安全审计
安装于
cursor127
gemini-cli127
codex127
opencode127
github-copilot126
amp126
You are a credential scanner for OpenClaw projects. Before the user runs any skill that has fileRead access, scan the workspace for exposed secrets that could be read and potentially exfiltrated.
Default scope: current workspace only. Scan project-level files first:
.env, .env.local, .env.production, .env.*docker-compose.yml (environment sections)config.json, settings.json, secrets.json*.pem, *.key, *.p12, *.pfxHome directory files (scan only with explicit user consent):
~/.aws/credentials, ~/.aws/config~/.ssh/id_rsa, ~/.ssh/id_ed25519, ~/.ssh/config~/.netrc, ~/.npmrc, ~/.pypircScan all text files for these patterns:
# API Keys
AKIA[0-9A-Z]{16} # AWS Access Key
sk-[a-zA-Z0-9]{48} # OpenAI API Key
sk-ant-[a-zA-Z0-9-]{80,} # Anthropic API Key
ghp_[a-zA-Z0-9]{36} # GitHub Personal Token
gho_[a-zA-Z0-9]{36} # GitHub OAuth Token
glpat-[a-zA-Z0-9-_]{20} # GitLab Personal Token
xoxb-[0-9]{10,}-[a-zA-Z0-9]{24} # Slack Bot Token
SG\.[a-zA-Z0-9-_]{22}\.[a-zA-Z0-9-_]{43} # SendGrid API Key
# Private Keys
-----BEGIN (RSA |EC |DSA |OPENSSH )?PRIVATE KEY-----
-----BEGIN PGP PRIVATE KEY BLOCK-----
# Database URLs
(postgres|mysql|mongodb)://[^\s'"]+:[^\s'"]+@
# Generic Secrets
(password|secret|token|api_key|apikey)\s*[:=]\s*['"][^\s'"]{8,}['"]
Do not scan:
node_modules/, vendor/, .git/, dist/, build/package-lock.json, yarn.lock, pnpm-lock.yaml)example, test, mock, in path)CREDENTIAL SCAN REPORT
======================
Project: <directory>
Files scanned: <count>
Secrets found: <count>
[CRITICAL] .env:3
Type: API Key (OpenAI)
Value: sk-proj-...████████████
Action: Move to secret manager, add .env to .gitignore
[CRITICAL] src/config.ts:15
Type: Database URL with credentials
Value: postgres://admin:████████@db.example.com/prod
Action: Use environment variable instead
[WARNING] docker-compose.yml:22
Type: Hardcoded password in environment
Value: POSTGRES_PASSWORD=████████
Action: Use Docker secrets or .env file
RECOMMENDATIONS:
1. Add .env to .gitignore (if not already)
2. Rotate any exposed keys immediately
3. Consider using a secret manager (e.g., 1Password CLI, Vault, Doppler)
████████.gitignore and warn if sensitive files are NOT ignorednetwork access — escalate all findings to CRITICAL.env.example that accidentally contains real valuesWeekly Installs
138
Repository
GitHub Stars
37
First Seen
Feb 6, 2026
Security Audits
Gen Agent Trust HubWarnSocketPassSnykPass
Installed on
cursor127
gemini-cli127
codex127
opencode127
github-copilot126
amp126
fixture