Detect exposed secrets, API keys, and credentials in code. Use when auditing for secret leaks. Trigger with 'scan for secrets', 'find exposed keys', or 'check credentials'.
Scans your codebase for exposed API keys, passwords, and credentials using pattern matching and entropy analysis. Automatically triggers when you request to scan for secrets, find exposed keys, or check credentials.
/plugin marketplace add jeremylongshore/claude-code-plugins-plus/plugin install secret-scanner@claude-code-plugins-plusThis skill is limited to using the following tools:
assets/README.mdreferences/README.mdscripts/README.mdscripts/scan_directory.pyThis skill provides automated assistance for secret scanner tasks.
This skill enables Claude to scan your codebase for exposed secrets, API keys, passwords, and other sensitive credentials. It helps you identify and remediate potential security vulnerabilities before they are committed or deployed.
secret-scanner plugin.This skill activates when you need to:
User request: "Scan for AWS keys in the codebase"
The skill will:
secret-scanner plugin.User request: "Check for exposed credentials in config files"
The skill will:
secret-scanner plugin.database.yml, .env) for password patterns.secret-scanner into your pre-commit hooks to prevent committing secrets.This skill can be integrated with other security tools, such as vulnerability scanners, to provide a comprehensive security assessment of your codebase. It can also be combined with notification plugins to alert you when new secrets are detected.
If security scanning fails:
Master authentication and authorization patterns including JWT, OAuth2, session management, and RBAC to build secure, scalable access control systems. Use when implementing auth systems, securing APIs, or debugging security issues.