suspicious.exposed_secret_literal
- Location
- SKILL.md:494
- Finding
- File appears to expose a hardcoded API secret or token.
AdvisoryAudited by Static analysis on May 10, 2026.
Detected: suspicious.exposed_secret_literal
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Private or inaccurate details written into memory files can persist and influence future agent behavior.
The skill is designed to persist user and project context across sessions, including personal preferences, relationships, goals, and business information.
MEMORY.md ← Long-term curated memory (the brain) ... About [Human] - Name, preferences, timezone, communication style ... Key relationships, roles, goals
Keep these files in a private workspace, review them regularly, avoid secrets, and delete or correct sensitive or inaccurate entries.
Memory files may change during scheduled or automatic maintenance, and those changes can affect later sessions.
The README describes automated maintenance during agent wake-ups, which could update persistent memory outside a direct user command if the host environment supports such heartbeats.
Heartbeat Integration — automated memory maintenance during agent wake-ups
Enable heartbeat-style maintenance only if desired, keep changes reviewable, and periodically inspect the generated memory files.
If the original file contains a real secret rather than an example placeholder, it would indicate poor credential hygiene, though no user credential access is shown.
The static scan reports a possible exposed API key literal, but the supplied evidence is redacted and no code or instructions show use of credentials.
- API key: [REDACTED]
Inspect the original SKILL.md line, remove any real secret, and use clearly fake placeholders in documentation.