Skylv Secret Detector

PassAudited by ClawScan on May 3, 2026.

Overview

This instruction-only skill uses local search commands to find possible secrets in code and does not show hidden persistence, credential collection, uploads, or destructive behavior.

This looks safe for its stated purpose. Use it only in repositories you intend to inspect, do not paste raw secret findings into public places, and rotate or revoke any real credentials it finds.

Findings (2)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If run from the wrong directory, the scan may inspect more local code files than intended.

Why it was flagged

The skill documents local recursive command-line searches. This is expected for a secret scanner and is non-mutating, but it still reads files under the current directory.

Skill content
grep -rE "ghp_[a-zA-Z0-9]{36}|AKIA[0-9A-Z]{16}" --include="*.js" --include="*.py" .
Recommendation

Run the skill from the specific repository or folder you want to scan, and review commands before executing them.

What this means

Found secrets may be exposed to whoever can see the scan output or chat transcript.

Why it was flagged

The skill is designed to surface sensitive credentials. Any real matches could appear in terminal output or agent context, which should be handled carefully.

Skill content
Patterns to Detect
AWS Key: AKIA[0-9A-Z]{16}
GitHub Token: ghp_[a-zA-Z0-9]{36}
Private Key: -----BEGIN (RSA|DSA|EC) PRIVATE KEY-----
Recommendation

Avoid sharing raw findings publicly, redact sensitive values when reporting, and rotate or revoke any confirmed leaked secrets.