Environment Secrets Rotator

ReviewAudited by ClawScan on May 18, 2026.

Overview

The skill mostly matches its secret-rotation purpose, but it appears to save generated secrets to a persistent history file automatically, which needs review before use.

Review the full script, especially history handling, before installing. If you use it, start with --dry-run, rotate only explicitly selected files and keys, avoid production secrets until you understand where outputs, backups, and history are stored, and delete any plaintext history or backup files you do not need.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A mistaken broad rotation could invalidate application credentials or break services, although the skill includes dry-run and backup options.

Why it was flagged

The tool can rotate every parsed key in a selected .env file and then write replacements back to disk. That matches the skill purpose, but it is a high-impact operation if run on the wrong file or in production.

Skill content
if keys == ["*"]: keys_to_rotate = list(current_values.keys()) ... EnvFileParser.write_file(target_file, new_values, original_lines)
Recommendation

Use --dry-run first, specify exact files and keys where possible, and require explicit user approval before any non-dry-run rotation on production or shared configuration files.

What this means

New secrets may be visible in logs or conversation history after rotation.

Why it was flagged

The skill intentionally prints newly generated secret values and Vault command strings containing those values. This is disclosed and purpose-aligned, but it exposes credential material to terminal, agent, or chat logs.

Skill content
No encryption - Generated secrets are shown in plaintext in output
Recommendation

Run it in a controlled session, avoid sharing outputs, and rotate again if generated values are exposed in logs or transcripts.

What this means

Newly rotated secrets may remain stored in a local history file after the task, increasing the chance that live credentials are later exposed or reused unintentionally.

Why it was flagged

The visible code creates a persistent home-directory history file and passes the generated new secret values into a history recorder for every non-dry-run rotation. SKILL.md says history tracking is optional and requires enabling, but the visible rotate flow does not show an opt-in or redaction control.

Skill content
self.history_file = Path.home() / ".env-rotation-history.json" ... if not dry_run: self._record_history(filepath, keys_to_rotate, new_values)
Recommendation

Make history recording explicit opt-in, redact or avoid storing secret values, document the file location and retention behavior, and provide a safe cleanup command. Users should inspect or remove ~/.env-rotation-history.json if they test the skill.