Install
openclaw skills install secret-detectionGit hook to detect secrets before commit.
openclaw skills install secret-detectionThis skill provides a git pre‑commit hook that scans staged files for common secret patterns (API keys, passwords, tokens) and blocks the commit if any are found. It helps prevent accidental leakage of secrets to public repositories.
Inputs: Git staged files (automatically scanned by the hook) or manual file paths.
Outputs: Detection report with line numbers; non‑zero exit code if secrets found.
Use this skill when:
# Install the hook in your git repository
./scripts/main.py install
# Scan specific files
./scripts/main.py scan --file path/to/file
# Scan all staged files (like the hook does)
./scripts/main.py scan --staged
git commit$ ./scripts/main.py install
✓ Pre-commit hook installed at .git/hooks/pre-commit
✓ Hook will scan for secrets on every commit
$ git commit -m "Add config"
⚠️ Secret detected in config.yaml line 12: AWS_ACCESS_KEY_ID=AKIA...
⚠️ Secret detected in .env line 3: PASSWORD=secret123
✗ Commit blocked: 2 secrets found
$ ./scripts/main.py scan --staged
Scanning 3 staged files...
✓ config.yaml: clean
✓ .env: clean
✓ src/main.py: clean
✓ No secrets found