From secret-scanner
Detect exposed secrets, API keys, and credentials in code. Use when auditing for secret leaks. Trigger with 'scan for secrets', 'find exposed keys', or 'check credentials'.
npx claudepluginhub flight505/skill-forge --plugin secret-scannerThis skill is limited to using the following tools:
Detect exposed API keys, passwords, tokens, and private keys in source code using pattern matching and entropy analysis, with remediation guidance for each finding.
Prevents silent decimal mismatch bugs in EVM ERC-20 tokens via runtime decimals lookup, chain-aware caching, bridged-token handling, and normalization. For DeFi bots, dashboards using Python/Web3, TypeScript/ethers, Solidity.
Share bugs, ideas, or general feedback.
Detect exposed API keys, passwords, tokens, and private keys in source code using pattern matching and entropy analysis, with remediation guidance for each finding.
scan your codebase for exposed secrets, API keys, passwords, and other sensitive credentials. It helps you identify and remediate potential security vulnerabilities before they are committed or deployed.
secret-scanner plugin.This skill activates when you need to:
User request: "Scan for AWS keys in the codebase"
The skill will:
secret-scanner plugin.User request: "Check for exposed credentials in config files"
The skill will:
secret-scanner plugin.database.yml, .env) for password patterns.secret-scanner into your pre-commit hooks to prevent committing secrets.This skill can be integrated with other security tools, such as vulnerability scanners, to provide a comprehensive security assessment of your codebase. It can also be combined with notification plugins to alert you when new secrets are detected.
If security scanning fails: