✓ Verified
💻 Development
✓ Enhanced Data
Nirwan Secret Scanner
Scans files, repos, and directories for leaked secrets — API keys, tokens, passwords, connection str
- Rating
- 4.9 (221 reviews)
- Downloads
- 48,549 downloads
- Version
- 1.0.0
Overview
Scans files, repos, and directories for leaked secrets — API keys, tokens, passwords, connection strings, private.
Complete Documentation
View Source →name: secret-scanner description: Scans files, repos, and directories for leaked secrets — API keys, tokens, passwords, connection strings, private keys, and credentials. Detects 40+ secret patterns across all major cloud providers and services. version: 0.1.0
Secret Scanner
Security skill that scans code, config files, and repos for accidentally leaked secrets and credentials.When to Use This Skill
Use this skill when the user:- Asks to "check for leaked secrets" or "scan for API keys"
- Wants to audit a repo or folder before committing or publishing
- Says "are there any hardcoded passwords in this code?"
- Asks to "find credentials" or "check for exposed tokens"
- Wants pre-commit or pre-publish security checks
- Mentions concern about accidentally checking in secrets
Capabilities
- Detect 40+ secret patterns including:
- AWS Access Keys, Secret Keys, Session Tokens
- Azure Storage Keys, Connection Strings, SAS Tokens
- GCP Service Account Keys, API Keys
- GitHub / GitLab / Bitbucket Personal Access Tokens
- OpenAI, Anthropic, Hugging Face API Keys
- Slack Bot Tokens, Webhooks
- Stripe, Twilio, SendGrid Keys
- Database connection strings (MongoDB, PostgreSQL, MySQL, Redis)
- SSH Private Keys, PEM/PFX Certificates
- JWT Tokens, Bearer Tokens
- Generic passwords in config files (password=, secret=, token=)
- Scan individual files, directories, or entire repos recursively
- Ignore binary files, node_modules, .git, and other non-relevant paths
- Output results as Markdown report or JSON
- Provide severity ratings (Critical, High, Medium, Low)
- Suggest remediation for each finding
How to Scan
Scan a directory
``bash
python secret_scanner.py /path/to/project
`
Scan with JSON output
`bash
python secret_scanner.py /path/to/project --json
`
Scan and save report
`bash
python secret_scanner.py /path/to/project --output report.md
`
Within an Agent
`
"Scan this project for leaked secrets"
"Check if there are any API keys in the codebase"
"Run secret-scanner on the current directory"
"Find hardcoded passwords in my config files"
"Audit this repo before I push to GitHub"
`
Secret Patterns Detected
Cloud Provider Keys
| Provider | Secrets Detected |
|----------|-----------------|
| AWS | Access Key ID (AKIA...), Secret Access Key, Session Token |
| Azure | Storage Account Key, Connection String, SAS Token, Client Secret |
| GCP | API Key (AIza...), Service Account JSON, OAuth Client Secret |
AI / LLM Keys
| Service | Pattern |
|---------|---------|
| OpenAI | sk- prefixed API keys |
| Anthropic | sk-ant- prefixed keys |
| Hugging Face | hf_ prefixed tokens |
| Cohere | API keys in config |
Developer Platforms
| Platform | Secrets Detected |
|----------|-----------------|
| GitHub | ghp_, gho_, ghu_, ghs_, ghr_ tokens |
| GitLab | glpat- tokens |
| Slack | xoxb-, xoxp-, xoxs- tokens, webhook URLs |
| Stripe | sk_live_, sk_test_, rk_live_ keys |
| Twilio | Account SID, Auth Token |
| SendGrid | SG. prefixed API keys |
Databases & Infrastructure
| Type | Pattern |
|------|---------|
| MongoDB | mongodb:// or mongodb+srv:// with credentials |
| PostgreSQL | postgresql:// with embedded password |
| MySQL | mysql:// with embedded password |
| Redis | redis:// with password |
| SSH | -----BEGIN (RSA\|EC\|OPENSSH) PRIVATE KEY----- |
| Certificates | PEM, PFX, P12 with embedded keys |
Generic Patterns
| Pattern | Description |
|---------|-------------|
| password= | Hardcoded passwords in config/env files |
| secret= | Hardcoded secrets |
| token= | Hardcoded tokens |
| Bearer | Bearer tokens in code |
| Basic Auth | Base64-encoded basic auth headers |
| JWT | eyJ prefixed JWT tokens |
| High Entropy | Long random strings that look like secrets |
Severity Levels
| Severity | Description | Examples |
|----------|-------------|----------|
| 🔴 Critical | Active production credentials | AWS Secret Key, Private Keys, DB passwords |
| 🟠 High | Service tokens with broad access | GitHub PAT, Slack Bot Token, Stripe Live Key |
| 🟡 Medium | Keys that may be test/dev | Test API keys, example tokens |
| 🟢 Low | Potential false positives | Generic password= in comments, placeholder values |
Files Scanned
Scans these file types by default:
- Source code:
.py, .js, .ts, .java, .go, .rb, .php, .cs, .rs
- Config:
.json, .yaml, .yml, .toml, .ini, .cfg, .conf
- Environment:
.env, .env.local, .env.production
- Shell:
.sh, .bash, .zsh, .ps1
- Docs:
.md, .txt
- Other:
Dockerfile, docker-compose.yml, Makefile
Ignored Paths
Automatically skips:
node_modules/, vendor/, venv/, .venv/
.git/, .svn/
__pycache__/, .pytest_cache/
- Binary files, images, compiled outputs
package-lock.json, yarn.lock
Remediation Guidance
When secrets are found, the skill recommends:
- Rotate the secret immediately — assume it's compromised
- Remove from code — use environment variables or a secrets manager instead
- Add to .gitignore — prevent
.env and credential files from being committed
- Use git-filter-repo — to remove secrets from git history
- Enable pre-commit hooks — to catch secrets before they're committed
Requirements
- Python 3.7+
- No additional dependencies (uses Python standard library)
Entry Point
- CLI:
secret_scanner.py`
Tags
#security #secrets #credentials #api-keys #tokens #passwords #scanner #audit #pre-commit #leak-detection #cloud #aws #azure #gcp #devopsInstallation
Terminal bash
openclaw install nirwan-secret-scanner
Copied!
Tags
#coding_agents-and-ides
#api
Quick Info
Category Development
Model Claude 3.5
Complexity One-Click
Author nirwandogra
Last Updated 3/10/2026
🚀
Optimized for
Claude 3.5
Ready to Install?
Get started with this skill in seconds
openclaw install nirwan-secret-scanner
Related Skills
✓ Verified
💻 Development
4claw
4claw — a moderated imageboard for AI agents.
🧠 Claude-Ready
)}
★ 4.4 (118)
↓ 4,990
v1.0.0
✓ Verified
💻 Development
Aap Passport
Agent Attestation Protocol - The Reverse Turing Test.
🧠 Claude-Ready
)}
★ 4.3 (89)
↓ 4,621
v1.0.0
✓ Verified
💻 Development
Acestep Lyrics Transcription
Transcribe audio to timestamped lyrics using OpenAI Whisper or ElevenLabs Scribe API.
⚡ GPT-Optimized
)}
★ 3.8 (274)
↓ 17,648
v1.0.0
✓ Verified
💻 Development
Adaptive Suite
A continuously adaptive skill suite that empowers Clawdbot.
🧠 Claude-Ready
)}
★ 4.7 (88)
↓ 1,625
v1.0.0