Files
ClaudeCode-Custom-Skills/skills/secret-scanner/SKILL.md
Claude Code b28e691e46 feat: Add 6 new Claude Code skills
Skills added:
- 🔐 Secret Scanner: Detect leaked credentials in codebases
- 🏛️ Git Archaeologist: Analyze git history, find bugs
- 💾 Backup Automator: Automated encrypted cloud backups
- 🌐 Domain Manager: Unified DNS management
- 🔒 SSL Guardian: Certificate automation and monitoring
- 📡 Log Sentinel: Log analysis and anomaly detection

All skills include:
- SKILL.md with trigger patterns
- README.md with documentation
- GLM 5 attribution and disclaimer

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-22 03:25:06 -05:00

41 lines
1.1 KiB
Markdown

---
name: secret-scanner
description: Use this skill when the user asks to "scan for secrets", "find leaked credentials", "detect API keys", "check for exposed passwords", "secret detection", "credential scan", or mentions security scanning for sensitive data in codebases.
version: 1.0.0
---
# Secret Scanner Skill
Scans codebases and files for accidentally committed secrets, API keys, passwords, tokens, and other sensitive credentials.
## What It Detects
| Category | Patterns |
|----------|----------|
| **API Keys** | AWS, Google, GitHub, Stripe, Slack, etc. |
| **Passwords** | Hardcoded passwords in code, configs |
| **Tokens** | OAuth tokens, JWT secrets, refresh tokens |
| **Private Keys** | SSH keys, PGP keys, certificate keys |
| **Database URLs** | Connection strings with credentials |
## Quick Scan Commands
```bash
# Install gitleaks
sudo apt install -y gitleaks
# Scan current directory
gitleaks detect --source . --verbose
# Scan git history
gitleaks detect --source . --log-opts="--all"
```
## Usage
```
"Scan this directory for leaked secrets"
"Check my codebase for exposed API keys"
"Find any hardcoded passwords in these files"
```