Skills openclaw-sentry

OpenClaw Sentry

install
source · Clone the upstream repo
git clone https://github.com/openclaw/skills
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/openclaw/skills "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/atlaspa/openclaw-sentry" ~/.claude/skills/clawdbot-skills-openclaw-sentry && rm -rf "$T"
OpenClaw · Install into ~/.openclaw/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/openclaw/skills "$T" && mkdir -p ~/.openclaw/skills && cp -r "$T/skills/atlaspa/openclaw-sentry" ~/.openclaw/skills/clawdbot-skills-openclaw-sentry && rm -rf "$T"
manifest: skills/atlaspa/openclaw-sentry/SKILL.md
source content

OpenClaw Sentry

Scans your agent workspace for leaked secrets — API keys, tokens, passwords, private keys, and credentials that should never be in plain text.

The Problem

Agent workspaces accumulate secrets: API keys in config files, tokens in memory logs, passwords in environment files. A single leaked credential can compromise your entire infrastructure. Existing secret scanners work on git repos — nothing watches the agent workspace itself.

Commands

Full Scan

Scan all workspace files for secrets and high-risk files.

python3 {baseDir}/scripts/sentry.py scan --workspace /path/to/workspace

Check Single File

Check a specific file for secrets.

python3 {baseDir}/scripts/sentry.py check MEMORY.md --workspace /path/to/workspace

Quick Status

One-line summary of secret exposure risk.

python3 {baseDir}/scripts/sentry.py status --workspace /path/to/workspace

What It Detects

ProviderPatterns
AWSAccess keys (AKIA...), secret keys
GitHubPATs (ghp_, gho_, ghs_, ghr_, github_pat_)
SlackBot/user tokens (xox...), webhooks
StripeSecret keys (sk_live_), publishable keys
OpenAIAPI keys (sk-...)
AnthropicAPI keys (sk-ant-...)
GoogleAPI keys (AIza...), OAuth secrets
AzureStorage account keys
GenericAPI keys, secrets, passwords, bearer tokens, connection strings
CryptoPEM private keys, .key/.pem/.p12 files
DatabasePostgreSQL/MySQL/MongoDB/Redis URLs with credentials
JWTJSON Web Tokens
Environment.env files with variables

Exit Codes

  • 0
    — Clean, no secrets found
  • 1
    — Warnings (high-risk files detected)
  • 2
    — Critical secrets found

No External Dependencies

Python standard library only. No pip install. No network calls. Everything runs locally.

Cross-Platform

Works with OpenClaw, Claude Code, Cursor, and any tool using the Agent Skills specification.