Learn-skills.dev secret-scanner
This skill should be used when the user asks to "scan for secrets", "find API keys", "detect credentials", "check for hardcoded passwords", "find leaked tokens", "scan for sensitive keys", "check git history for secrets", "audit repository for credentials", or mentions secret detection, credential scanning, API key exposure, token leakage, password detection, or security key auditing.
git clone https://github.com/NeverSight/learn-skills.dev
T=$(mktemp -d) && git clone --depth=1 https://github.com/NeverSight/learn-skills.dev "$T" && mkdir -p ~/.claude/skills && cp -r "$T/data/skills-md/1mangesh1/dev-skills-collection/secret-scanner" ~/.claude/skills/neversight-learn-skills-dev-secret-scanner && rm -rf "$T"
data/skills-md/1mangesh1/dev-skills-collection/secret-scanner/SKILL.mdSecret Scanner
A comprehensive secret detection skill for AI agents. Detects API keys, tokens, passwords, private keys, and credentials across 50+ services. Features entropy-based detection, git history scanning, and CI/CD integration.
Capabilities
- Secret Detection - Find hardcoded secrets using 200+ regex patterns
- Entropy Analysis - Detect high-entropy strings that may be secrets
- Provider Coverage - AWS, GCP, Azure, GitHub, Stripe, and 50+ more
- Git History Scan - Scan entire commit history for leaked secrets
- File Type Support - Code, configs, env files, JSON, YAML, and more
- Risk Scoring - Score findings by severity and exposure context
- False Positive Filtering - Smart exclusions for test data and examples
- Remediation Guidance - Step-by-step secret rotation instructions
- CI/CD Integration - Pre-commit hooks and GitHub Actions
- Allowlist Support - Configure known-safe patterns to skip
Usage
/secret-scanner [command] [path] [options]
Commands
- Scan files or directories for secretsscan <path>
- Scan git history for leaked secretsscan-git <path>
- Full security audit with report generationaudit <path>
- Check if a specific string matches secret patternsverify <secret>
- List all supported secret providersproviders
- Generate report from existing findingsreport
Options
- Output format: json, markdown, sarif (default: markdown)--format <type>
- Write results to file--output <file>
- Minimum severity: low, medium, high, critical--severity <level>
- File patterns to include--include <patterns>
- File patterns to exclude--exclude <patterns>
- Entropy threshold (default: 4.5)--entropy <threshold>
- Disable entropy-based detection--no-entropy
- Path to allowlist configuration--allowlist <file>
- Number of commits to scan (default: all)--git-depth <n>
Workflow
When invoked, follow this workflow:
Step 1: Determine Scan Scope
Ask the user to specify:
- Target path (file, directory, or repository)
- Scan type (current files, git history, or both)
- Whether to include entropy-based detection
Step 2: File Discovery
Use Glob to find relevant files:
# Source code **/*.{py,js,ts,tsx,jsx,java,go,rb,php,cs,swift,kt,rs,c,cpp,h} # Configuration **/*.{env,json,yaml,yml,xml,toml,ini,conf,cfg,properties} # Infrastructure **/*.{tf,tfvars,hcl,dockerfile,docker-compose*} # Shell scripts **/*.{sh,bash,zsh,ps1,bat,cmd} # Certificates and keys **/*.{pem,key,p12,pfx,jks,keystore}
Step 3: Pattern Matching
Apply detection patterns from
references/secret-patterns.md:
Critical Severity
# AWS Access Keys AKIA[0-9A-Z]{16} # AWS Secret Keys (?i)aws.{0,20}['"][0-9a-zA-Z/+]{40}['"] # GitHub Tokens gh[pousr]_[A-Za-z0-9_]{36,255} # Private Keys -----BEGIN (RSA |EC |DSA |OPENSSH )?PRIVATE KEY-----
High Severity
# Generic API Keys (?i)(api[_-]?key|apikey)['"]?\s*[:=]\s*['"][a-zA-Z0-9_\-]{20,}['"] # Generic Tokens (?i)(token|bearer|auth)['"]?\s*[:=]\s*['"][a-zA-Z0-9_\-\.]{20,}['"] # Passwords (?i)(password|passwd|pwd)['"]?\s*[:=]\s*['"][^'"]{8,}['"]
Step 4: Entropy Analysis
For strings not matching known patterns, calculate Shannon entropy:
def calculate_entropy(string): """Calculate Shannon entropy of a string.""" from collections import Counter import math if not string: return 0 counts = Counter(string) length = len(string) entropy = -sum( (count / length) * math.log2(count / length) for count in counts.values() ) return entropy # Flag strings with entropy > 4.5 and length >= 20
Step 5: Context Analysis
For each potential secret:
- Check surrounding context (variable names, comments)
- Verify it's not in a test/example file
- Check against allowlist
- Determine exposure context (public repo, .env, etc.)
Step 6: Calculate Risk Score
Apply formula from
references/risk-scoring.md:
Risk = (Sensitivity × 0.40) + (Exposure × 0.30) + (Verifiability × 0.15) + (Scope × 0.15)
Step 7: Generate Output
Format findings following
examples/sample-finding.json:
{ "id": "S-20260204-0001", "file": "config/settings.py", "line": 42, "secret_type": "aws_access_key", "provider": "AWS", "value_preview": "AKIA...XXXX", "confidence": 0.98, "risk_score": 95, "severity": "critical", "context": "AWS_ACCESS_KEY = 'AKIA[REDACTED]'", "remediation": [...], "verified": false }
Supported Providers
Cloud Providers
| Provider | Secret Types | Pattern Count |
|---|---|---|
| AWS | Access Keys, Secret Keys, Session Tokens | 8 |
| GCP | API Keys, Service Account Keys, OAuth | 6 |
| Azure | Storage Keys, Connection Strings, SAS Tokens | 7 |
| DigitalOcean | API Tokens, Spaces Keys | 3 |
| Heroku | API Keys, OAuth Tokens | 2 |
| Alibaba Cloud | Access Keys, Secret Keys | 3 |
Code Platforms
| Provider | Secret Types | Pattern Count |
|---|---|---|
| GitHub | Personal Access Tokens, App Tokens, OAuth | 5 |
| GitLab | Personal Tokens, Pipeline Tokens, Runner Tokens | 4 |
| Bitbucket | App Passwords, OAuth, Repository Tokens | 3 |
| npm | Auth Tokens, Publish Tokens | 2 |
| PyPI | API Tokens | 1 |
Payment Services
| Provider | Secret Types | Pattern Count |
|---|---|---|
| Stripe | Secret Keys, Publishable Keys, Restricted Keys | 4 |
| PayPal | Client Secrets, Access Tokens | 2 |
| Square | Access Tokens, Application IDs | 2 |
| Braintree | Access Tokens, Merchant IDs | 2 |
Communication Services
| Provider | Secret Types | Pattern Count |
|---|---|---|
| Twilio | Account SID, Auth Token, API Key | 4 |
| SendGrid | API Keys | 2 |
| Mailchimp | API Keys | 1 |
| Slack | Bot Tokens, User Tokens, Webhooks | 4 |
| Discord | Bot Tokens, Webhooks | 2 |
Database Services
| Provider | Secret Types | Pattern Count |
|---|---|---|
| MongoDB | Connection Strings | 2 |
| PostgreSQL | Connection Strings | 2 |
| MySQL | Connection Strings | 2 |
| Redis | Connection Strings, Auth Tokens | 2 |
Other Services
| Provider | Secret Types | Pattern Count |
|---|---|---|
| OpenAI | API Keys | 2 |
| Anthropic | API Keys | 1 |
| Firebase | API Keys, Admin SDK Keys | 3 |
| Cloudflare | API Keys, API Tokens | 2 |
| Datadog | API Keys, App Keys | 2 |
| New Relic | License Keys, API Keys | 2 |
| Auth0 | Client Secrets, API Tokens | 2 |
| Okta | API Tokens | 1 |
| JWT | Tokens (signature analysis) | 1 |
Full pattern list:
references/secret-patterns.md
Git History Scanning
Scan Modes
- Full History - Scan all commits
- Depth Limited - Scan last N commits
- Branch Specific - Scan specific branch
- Diff Mode - Only scan changed lines
Usage
# Scan entire history /secret-scanner scan-git ./repo # Scan last 100 commits /secret-scanner scan-git ./repo --git-depth 100 # Scan specific branch /secret-scanner scan-git ./repo --branch feature/auth
Git-Specific Findings
{ "commit": "abc123", "author": "developer@example.com", "date": "2026-01-15T10:30:00Z", "message": "Add API configuration", "file": "config.py", "secret_type": "stripe_secret_key", "still_present": false, "removed_in": "def456" }
Entropy-Based Detection
How It Works
- Extract string literals and values from files
- Calculate Shannon entropy for each string
- Flag high-entropy strings (> 4.5) that are:
- At least 20 characters long
- Contain mixed character classes
- In security-sensitive contexts
Entropy Thresholds
| Threshold | Detection Level | False Positive Rate |
|---|---|---|
| 3.5 | Aggressive | High |
| 4.0 | Moderate | Medium |
| 4.5 | Balanced (default) | Low |
| 5.0 | Conservative | Very Low |
Context Boosting
Entropy findings are boosted if found in:
- Variable names containing: key, secret, token, password, auth
- Files:
,.env
,secrets.*credentials.* - Config sections:
,[credentials][auth]
False Positive Handling
Built-in Exclusions
- Test Files -
,*_test.*
,*_spec.*
,test_*.*__tests__/* - Example Files -
,example.*
,sample.*demo.* - Documentation -
,*.md
,*.rstdocs/* - Mock Data - Files containing "mock", "fake", "dummy"
- Known Safe Patterns:
(AWS example key)AKIAIOSFODNN7EXAMPLE
(Stripe test keys)sk_test_*
(Stripe test publishable keys)pk_test_*
(Slack example)xoxb-PLACEHOLDER-EXAMPLE-TOKEN
Allowlist Configuration
Create
.secret-scanner-allowlist.yaml:
# Allowlist configuration patterns: # Regex patterns to ignore - "EXAMPLE_[A-Z_]+" - "test_api_key_\\d+" paths: # Files/directories to skip - "test/" - "fixtures/" - "*.example" hashes: # SHA256 hashes of known false positives - "abc123..." comments: # Inline comments that suppress warnings - "# secret-scanner:ignore" - "// nosecret"
Risk Scoring
Severity Levels
| Score | Severity | Response | Examples |
|---|---|---|---|
| 90-100 | Critical | Immediate | AWS keys, private keys, prod DB passwords |
| 70-89 | High | Within 4 hours | API keys, OAuth tokens, service accounts |
| 50-69 | Medium | Within 24 hours | Test API keys, internal tokens |
| 25-49 | Low | Within 1 week | Entropy matches, partial credentials |
| 0-24 | Info | Review | Possible false positives |
Factor Weights
- Sensitivity (40%): Type of secret and potential damage
- Exposure (30%): Where the secret was found
- Verifiability (15%): Can the secret be validated as real
- Scope (15%): Blast radius if exploited
Full methodology:
references/risk-scoring.md
Remediation Workflow
Step 1: Immediate Actions
- Revoke the secret - Invalidate immediately in provider console
- Rotate credentials - Generate new secret
- Update applications - Deploy new credentials
- Audit access logs - Check for unauthorized usage
Step 2: Clean Up
- Remove from code - Delete the hardcoded secret
- Clean git history - Use BFG or git filter-branch
- Force push - Update all branches
- Invalidate caches - Clear CI/CD caches
Step 3: Prevention
- Add to .gitignore - Prevent future commits
- Install pre-commit hook - Block commits with secrets
- Use secrets manager - AWS Secrets Manager, HashiCorp Vault
- Environment variables - Store secrets in environment
Provider-specific instructions:
references/remediation.md
CI/CD Integration
Pre-Commit Hook
# Install the pre-commit hook cp scripts/pre-commit-hook.sh .git/hooks/pre-commit chmod +x .git/hooks/pre-commit
Pre-commit Framework
# .pre-commit-config.yaml repos: - repo: local hooks: - id: secret-scanner name: Secret Scanner entry: python scripts/detect-secrets.py language: python types: [file] pass_filenames: true
GitHub Actions
# .github/workflows/secret-scan.yml name: Secret Scan on: [push, pull_request] jobs: scan: runs-on: ubuntu-latest steps: - uses: actions/checkout@v4 with: fetch-depth: 0 # Full history for git scanning - uses: actions/setup-python@v5 with: python-version: '3.11' - name: Run Secret Scan run: | python scripts/detect-secrets.py . --format sarif --output results.sarif - name: Upload SARIF uses: github/codeql-action/upload-sarif@v3 with: sarif_file: results.sarif
Environment Variables
# Configure behavior export SECRET_SCANNER_SEVERITY=high # Minimum severity to report export SECRET_SCANNER_ENTROPY=4.5 # Entropy threshold export SECRET_SCANNER_BLOCK=true # Block on findings export SECRET_SCANNER_ALLOWLIST=.secret-scanner-allowlist.yaml
Output Formats
JSON (findings.json)
Structured array with all findings and metadata.
Markdown (report.md)
Human-readable report with:
- Executive summary
- Findings by severity
- Provider breakdown
- Remediation checklist
SARIF
Static Analysis Results Interchange Format for GitHub Security tab integration.
Security Guardrails
- Never output full secrets - Show only prefix/suffix with masking
- Secure temporary files - Use scratchpad, clean up after
- No secret logging - Redact from all log output
- Verification is optional - Don't auto-verify against live APIs
- Respect allowlists - Honor configured exclusions
References
- All detection patternsreferences/secret-patterns.md
- Provider-specific patternsreferences/provider-patterns.md
- Entropy analysis methodologyreferences/entropy-detection.md
- Risk scoring methodologyreferences/risk-scoring.md
- Secret rotation guidesreferences/remediation.md
- Allowlist configurationreferences/allowlist-config.md
Examples
- Example finding outputexamples/sample-finding.json
- Example audit reportexamples/sample-report.md
- Example allowlist configurationexamples/allowlist.yaml
Scripts
- Main secret detection scriptscripts/detect-secrets.py
- Git history scannerscripts/scan-git-history.py
- Entropy-based detectionscripts/entropy-analyzer.py
- Report generationscripts/generate-report.py
- Git pre-commit hookscripts/pre-commit-hook.sh