Git Repo Auditor

ReviewAudited by ClawScan on May 1, 2026.

Overview

This is a coherent local Git auditing tool; the main caution is that its reports may include secret values found in repository history.

This skill appears safe for its stated purpose. Before installing or running it, remember that it scans Git history and may print or save snippets of real secrets it finds, so keep reports private and rotate any exposed credentials.

Findings (2)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the repository contains leaked secrets, the audit report itself may become sensitive and should not be shared broadly.

Why it was flagged

The scanner records part or all of each detected secret match in its output data. This is purpose-aligned for secret auditing, but generated terminal output or JSON reports may contain real credentials or tokens.

Skill content
"match": match.group(0)[:50] + ("..." if len(match.group(0)) > 50 else "")
Recommendation

Protect generated reports, avoid publishing scan output, and rotate any real secrets that are detected.

What this means

The tool can read files and historical commits in the repository path provided by the user.

Why it was flagged

The skill invokes local git commands to inspect repository metadata and history. This is central to the stated auditing purpose and does not use shell=True, but it still gives the tool access to the selected repository's contents and history.

Skill content
subprocess.run(["git"] + args, cwd=cwd, capture_output=True, text=True, timeout=30)
Recommendation

Run it only on intended local repositories and review report destinations, especially when using JSON output in automation.