Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Secrets Scanner

v1.0.0

Detect hardcoded secrets, exposed API keys, and credential misconfigurations in IaC and config files

0· 390·0 current·0 all-time
byAnmol Nagpal@anmolnagpal
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The name and description (detect hardcoded secrets in IaC/configs) align with the instructions which ask the user to provide files or CLI output. There are minor scope notes: the SKILL.md is AWS-focused (Lambda, ECS, Secrets Manager) so AWS-related permissions and recommendations are expected. However the included minimal IAM policy contains ssm:DescribeParameters which is not demonstrated in the example commands, and the metadata fields (price, pack: aws-security) are non-functional but consistent with a commercial scanner.
!
Instruction Scope
The instructions repeatedly say "do not ask for credentials" and to provide only exported or redacted data, which is good. But they also show sample aws CLI commands that will output environment variable names and values; elsewhere they ask for keys only. This contradiction is likely to lead users to paste sensitive values unintentionally. The guidance to "remove any actual secret values first" is necessary but relies on the user doing manual redaction. The skill explicitly says it won't run AWS CLI or access accounts directly (it is instruction-only), which is accurate and reduces autonomous risk, but the current instructions place the data-exposure burden entirely on the user.
Install Mechanism
This is an instruction-only skill with no install spec and no code files — the lowest install risk. Nothing is downloaded or written by the skill itself.
Credentials
No environment variables, binaries, or credentials are requested by the skill (primary credential: none). That is proportionate for a scanner that asks the user to paste/redact data. The only oddity is the provided minimal IAM permissions block (includes ssm:DescribeParameters) that isn't directly used in the shown commands; it should be clarified why SSM parameter access is listed.
Persistence & Privilege
The skill does not request persistent presence (always:false) and does not ask to modify agent-wide configuration. It is user-invocable and allows model invocation (default), which is normal for skills.
What to consider before installing
This skill appears to implement the stated goal (finding secrets) but has ambiguous instructions that could lead to accidental leakage of real secrets. Before installing or using it: - Never paste real secret values. Only paste redacted files (replace secrets with <REDACTED>) or provide filenames/paths for local scanning. - Ask the skill author to clarify and fix the contradictory guidance: if the tool needs only environment variable names, the SKILL.md should show safe AWS CLI queries that return only keys (not values), or explicit jq/JMESPath examples to strip values before copy/paste. For example, prefer commands that output only keys or run local commands like: aws lambda get-function-configuration --function-name NAME --query 'keys(Environment.Variables)'. (Verify the JMESPath expression locally.) - Confirm why ssm:DescribeParameters is included in the minimal IAM permissions and whether any additional permissions are required. - Prefer running any automated scanning locally (open-source tools like git-secrets, truffleHog, or local regex/high-entropy checks) rather than pasting data into a remote assistant session. - If you must share data with the skill, redact secret values first and confirm the skill's explicit rule to never output actual secret values. If the author can remove the contradictory CLI examples or explicitly show/how to redact values and justify the ssm permission, the skill becomes much less risky and more coherent.

Like a lobster shell, security has layers — review code before you run it.

latestvk97fhysf6hc0yfvzdvbv0n5ef1824h0p

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments