Detect exposed secrets, API keys, and credentials in code. Use when auditing for secret leaks. Trigger with 'scan for secrets', 'find exposed keys', or 'check credentials'.
5.2
Rating
0
Installs
Security
Category
The skill provides a clear structure and reasonable overview of secret scanning capabilities. The description adequately covers what the skill does (detect secrets, API keys, credentials) with appropriate trigger phrases. However, taskKnowledge is limited - while it references a 'secret-scanner plugin' and mentions patterns like AWS keys (AKIA[0-9A-Z]{16}), it lacks concrete implementation details, actual scanning scripts, or command sequences a CLI agent would execute. The examples describe workflows but don't show actual tool invocations. Structure is good with clear sections and logical flow. Novelty is moderate - while secret scanning is valuable, the skill as documented doesn't demonstrate significant complexity beyond what a CLI agent could accomplish with standard grep/pattern matching tools given sufficient tokens. To improve, add concrete bash scripts, specific tool commands (e.g., truffleHog, gitleaks, or custom regex patterns), and actual execution sequences that would meaningfully reduce token cost for the agent.
Loading SKILL.md…