Pattern Matching

v1.0.0

Provides patterns for detecting sensitive data like API keys, credit cards, emails, SSNs, phone numbers, and IPs for authorized security testing and validation.

0· 184·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for pandaai-1337/pattern-matching.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Pattern Matching" (pandaai-1337/pattern-matching) from ClawHub.
Skill page: https://clawhub.ai/pandaai-1337/pattern-matching
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install pattern-matching

ClawHub CLI

Package manager switcher

npx clawhub@latest install pattern-matching
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description claim pattern lists for detecting sensitive data; the shipped files are pattern/grep lists (API keys, credit cards, emails, SSNs, IPs, etc.) that directly match that purpose. No unrelated credentials, binaries, or configuration are requested.
Instruction Scope
SKILL.md only documents the collection, its source (SecLists GitHub), usage examples for reading the local reference files, and ethical use guidance. It does not instruct the agent to read unrelated system files, exfiltrate data, call external endpoints, or access environment variables beyond local file reads.
Install Mechanism
There is no install spec and no code to run; this is instruction-only with included reference files. Nothing is downloaded or executed by the skill at install time.
Credentials
The skill declares no required environment variables, credentials, or config paths. The content contains strings that match dangerous functions/backdoor indicators (expected for detection lists) but no request for secrets or unrelated service tokens.
Persistence & Privilege
The skill does not request always:true, does not modify other skills or system settings, and contains no installation scripts or components that would persist beyond the provided reference files.
Assessment
This skill is a static collection of detection patterns (from SecLists) and appears coherent for authorized security testing. Before installing: (1) Confirm you have permission to scan any target systems — the SKILL.md correctly warns about authorized use; (2) Verify provenance if provenance matters (source/homepage is marked 'unknown' though the SKILL.md points to the SecLists GitHub and MIT license); (3) Review the pattern files to ensure they match your use case and to avoid running them against sensitive production data unintentionally; (4) If you need the latest or full SecLists, consider pulling directly from the official GitHub repo rather than an unknown registry package.

Like a lobster shell, security has layers — review code before you run it.

latestvk97cewbym16hxn5j0n3c6ytm8983bmvv
184downloads
0stars
1versions
Updated 1mo ago
v1.0.0
MIT-0

SecLists Pattern-Matching

Description

Sensitive data patterns for security testing: API keys, credit cards, emails, SSNs, phone numbers, IPs, and more. Use for data discovery and validation.

Source: SecLists/Pattern-Matching Repository: https://github.com/danielmiessler/SecLists License: MIT

When to Use This Skill

Use this skill when you need:

  • API key detection in code/logs
  • Credit card validation testing
  • Email pattern matching
  • IP address discovery
  • SSN format validation
  • Phone number pattern testing

⚠️ IMPORTANT: Only use for authorized security testing, bug bounty programs, CTF competitions, or educational purposes.

Key Files in This Skill

  • api-keys.txt - API key patterns
  • credit-cards.txt - Credit card formats
  • email-addresses.txt - Email patterns
  • ip-addresses.txt - IP address patterns
  • ssn.txt - Social Security Number patterns
  • phone-numbers.txt - Phone number formats

Usage Example

# Access files from this skill
import os

# Example: Load patterns/payloads
skill_path = "references/Pattern-Matching"

# List all available files
for root, dirs, files in os.walk(skill_path):
    for file in files:
        if file.endswith('.txt'):
            filepath = os.path.join(root, file)
            print(f"Found: {filepath}")
            
            # Read file content
            with open(filepath, 'r', errors='ignore') as f:
                content = f.read().splitlines()
                print(f"  Lines: {len(content)}")

Security & Ethics

Authorized Use Cases ✅

  • Authorized penetration testing with written permission
  • Bug bounty programs (within scope)
  • CTF competitions
  • Security research in controlled environments
  • Testing your own systems
  • Educational demonstrations

Prohibited Use Cases ❌

  • Unauthorized access attempts
  • Testing without permission
  • Malicious activities
  • Privacy violations
  • Any illegal activities

Complete SecLists Collection

This is a curated subset of SecLists. For the complete collection:


Generated by Skill Seeker | SecLists Pattern-Matching Collection License: MIT - Use responsibly with proper authorization

Comments

Loading comments...