Log Pii Redactor

PassAudited by ClawScan on May 3, 2026.

Overview

The visible instruction-only skill is a coherent log-redaction guide, but users should handle any raw logs or generated deployment scripts carefully.

This skill appears safe to use as an instruction-only redaction assistant. Before installing or using it, plan to share only the minimum log samples needed, avoid pasting live secrets, rotate any exposed credentials you discover, and test generated regexes, scanner scripts, and Fluent Bit/Logstash/Vector/OpenTelemetry configs before production rollout. If the platform asks for wallet, purchase, OAuth, or sensitive-credential permissions, decline unless you can independently verify why they are needed, because the reviewed artifacts do not justify them.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Raw logs shared for analysis may expose customer, employee, health, payment, or other regulated personal data in the agent conversation.

Why it was flagged

The skill is intended to inspect user logs that may contain personal data; this is expected for the purpose but sensitive if raw production logs are provided to the agent.

Skill content
Audit my JSON app logs for PII ... Find the PII bleeding into your logs
Recommendation

Use minimized, sampled, or synthetic logs when possible; avoid pasting large raw production datasets; and prefer locally run scanners for highly regulated data.

What this means

If live tokens or keys are pasted into the agent, they should be treated as sensitive and potentially compromised.

Why it was flagged

The skill is designed to detect credentials and tokens inside logs. It does not ask to use those credentials, but users may expose live secrets while seeking redaction help.

Skill content
Secrets (not PII per se, but leak-equivalents) ... JWT ... AWS access key ... GitHub PAT ... Slack token ... Stripe key ... Generic bearer ... Private key
Recommendation

Mask or rotate any live credentials found in logs, and do not grant OAuth, wallet, purchase, or credential permissions unless a separate trusted workflow clearly requires them.

What this means

Incorrect generated rules could break logging, drop useful debugging data, or block builds if applied without review.

Why it was flagged

Generated scanner scripts and pipeline or CI configuration can affect deployments and observability behavior. This is user-directed and purpose-aligned, not automatic execution.

Skill content
The skill returns a regex pack, a per-field strategy table, integration config for the user's pipeline, a scanner script ... Write a pre-prod scanner that fails CI if PII is found
Recommendation

Review and test generated scripts/configuration in a non-production environment before enabling CI failures or changing production log pipelines.