Awesome-omni-skill openclaw-sentry-pro

Full secret scanning suite: detect leaked API keys, tokens, and credentials, then automatically redact, quarantine exposed files, and enforce .gitignore policies. Everything in openclaw-sentry (free) plus automated countermeasures.

install
source · Clone the upstream repo
git clone https://github.com/diegosouzapw/awesome-omni-skill
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/diegosouzapw/awesome-omni-skill "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/development/openclaw-sentry-pro" ~/.claude/skills/diegosouzapw-awesome-omni-skill-openclaw-sentry-pro && rm -rf "$T"
OpenClaw · Install into ~/.openclaw/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/diegosouzapw/awesome-omni-skill "$T" && mkdir -p ~/.openclaw/skills && cp -r "$T/skills/development/openclaw-sentry-pro" ~/.openclaw/skills/diegosouzapw-awesome-omni-skill-openclaw-sentry-pro && rm -rf "$T"
manifest: skills/development/openclaw-sentry-pro/SKILL.md
source content

OpenClaw Sentry Pro

Everything in openclaw-sentry (free) plus automated countermeasures.

Free version detects secrets. Pro version eliminates them.

Detection Commands (also in free)

Full Scan

Scan all workspace files for secrets and high-risk files.

python3 {baseDir}/scripts/sentry.py scan --workspace /path/to/workspace

Check Single File

Check a specific file for secrets.

python3 {baseDir}/scripts/sentry.py check MEMORY.md --workspace /path/to/workspace

Quick Status

One-line summary of secret exposure risk, quarantine status, and policy state.

python3 {baseDir}/scripts/sentry.py status --workspace /path/to/workspace

Pro Countermeasures

Redact Secrets

Find secrets in files and replace them with masked versions (e.g.,

sk-ant-abc...xyz
becomes
sk-ant-***REDACTED***
). Creates
.bak
backup before modifying. If no file specified, redact all files in workspace.

# Redact a single file
python3 {baseDir}/scripts/sentry.py redact config.json --workspace /path/to/workspace

# Redact all files in workspace
python3 {baseDir}/scripts/sentry.py redact --workspace /path/to/workspace

Quarantine a File

Move a file containing secrets to

.quarantine/sentry/
with metadata JSON recording what was found, when, and original location.

python3 {baseDir}/scripts/sentry.py quarantine .env --workspace /path/to/workspace

Unquarantine a File

Restore a quarantined file to its original location.

python3 {baseDir}/scripts/sentry.py unquarantine .env --workspace /path/to/workspace

Defend

Auto-generate/update

.gitignore
with common secret patterns (.env, *.pem, *.key, credentials.json, etc.) and create a
.sentry-policy.json
policy file listing which patterns to enforce.

python3 {baseDir}/scripts/sentry.py defend --workspace /path/to/workspace

Protect (Automated Sweep)

Full automated sweep: scan all files, auto-redact secrets in non-critical files, quarantine files with high-density secrets, update .gitignore. This is the recommended command for session startup.

python3 {baseDir}/scripts/sentry.py protect --workspace /path/to/workspace

Recommended Integration

Session Startup Hook (Claude Code)

{
  "hooks": {
    "SessionStart": [
      {
        "hooks": [
          {
            "type": "command",
            "command": "python3 scripts/sentry.py protect",
            "timeout": 30
          }
        ]
      }
    ]
  }
}

Heartbeat (OpenClaw)

Add to HEARTBEAT.md for periodic protection:

- Run secret scanning protection (python3 {skill:openclaw-sentry-pro}/scripts/sentry.py protect)

After Adding New Configs or Secrets

Run

protect
to auto-redact and quarantine any newly exposed credentials.

What It Detects

ProviderPatterns
AWSAccess keys (AKIA...), secret keys
GitHubPATs (ghp_, gho_, ghs_, ghr_, github_pat_)
SlackBot/user tokens (xox...), webhooks
StripeSecret keys (sk_live_), publishable keys
OpenAIAPI keys (sk-...)
AnthropicAPI keys (sk-ant-...)
GoogleAPI keys (AIza...), OAuth secrets
AzureStorage account keys
GenericAPI keys, secrets, passwords, bearer tokens, connection strings
CryptoPEM private keys, .key/.pem/.p12 files
DatabasePostgreSQL/MySQL/MongoDB/Redis URLs with credentials
JWTJSON Web Tokens
Environment.env files with variables

Countermeasure Summary

CommandAction
protect
Full scan + auto-redact + auto-quarantine + update .gitignore
redact [file]
Replace secrets with masked versions, backup originals
quarantine <file>
Move file to quarantine with metadata
unquarantine <file>
Restore a quarantined file
defend
Update .gitignore + create enforcement policy

No External Dependencies

Python standard library only. No pip install. No network calls. Everything runs locally.

Cross-Platform

Works with OpenClaw, Claude Code, Cursor, and any tool using the Agent Skills specification.