Scan code for accidentally committed secrets, API keys, and credentials.
Scans code for exposed secrets, API keys, and credentials with actionable remediation steps.
/plugin marketplace add marcel-Ngan/ai-dev-team/plugin install marcel-ngan-ai-dev-team@marcel-Ngan/ai-dev-teamScan code for accidentally committed secrets, API keys, and credentials.
/secret-scan [target] [--staged]
Arguments:
target - File, directory, or "all" (default: current directory)--staged - Only scan staged files (pre-commit check)/secret-scan
/secret-scan src/config/
/secret-scan --staged
/secret-scan all
## Secret Scan Results
**Target:** src/
**Files Scanned:** 128
**Scan Time:** 2024-01-15 10:30:00
### Secrets Found (4)
#### CRITICAL - AWS Access Key
**File:** src/config/aws.ts:12
```typescript
const AWS_KEY = "AKIAIOSFODNN7EXAMPLE";
Risk: AWS credentials exposed - immediate rotation required Action:
File: src/db/connection.ts:8
const DB_PASS = "super_secret_password_123";
Risk: Database credentials in source code Action: Use environment variable or secrets manager
File: src/services/external.ts:22 Pattern: Matches API key format Action: Verify if sensitive, move to env vars
## Skill Used
`security-secret-scan`
## Pre-commit Hook Integration
Add to your workflow:
```bash
# .git/hooks/pre-commit
/secret-scan --staged
if [ $? -ne 0 ]; then
echo "Secrets detected! Commit blocked."
exit 1
fi
Use the DevOps Engineer agent when: