Skylv Smart Secrets Scanner

ReviewAudited by ClawScan on May 10, 2026.

Overview

This looks like a legitimate secrets-scanning concept, but the reviewed package does not include the scanner it tells the agent to run, and it would handle real credentials.

Before installing or using this skill, confirm what scanner.js is and inspect it from a trusted source. Run scans only on authorized repositories, avoid sharing raw results, prefer redacted output, back up files before using auto-redact, and install the pre-commit hook only if you want ongoing automatic scanning.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An agent trying to use this skill may execute an unreviewed or unrelated local scanner.js while processing sensitive credentials.

Why it was flagged

The documented workflow depends on executing scanner.js, but the provided artifact set contains no code files or install spec, so the scanner implementation that would handle secrets is not reviewable or pinned.

Skill content
node scanner.js scan ./src
node scanner.js git-scan --depth 50
node scanner.js hook --install
Recommendation

Only run this after identifying and reviewing the exact scanner.js implementation from a trusted source, preferably in a sandbox.

What this means

Real API keys, tokens, private keys, or passwords could be read during a scan.

Why it was flagged

The skill is explicitly intended to access and identify credential material across local files and git history.

Skill content
Detects exposed API keys, passwords, tokens, private keys, and credentials in source code, config files, environment variables, and git commit history.
Recommendation

Run it only on repositories you own or are authorized to audit, and avoid scanning unrelated private directories.

What this means

Secrets found by the scan could be exposed in chat history, logs, reports, or copied remediation output.

Why it was flagged

The sample output includes the full matched secret value rather than a redacted preview, which could place real secrets into agent context, logs, or summaries.

Skill content
"matched": "AKIAIOSFODNN7EXAMPLE"
Recommendation

Prefer redacted findings, avoid sharing raw scan output, and manually rotate any real secrets that appear in output.

What this means

A redaction run could change application files and potentially break configuration if applied without review.

Why it was flagged

The skill documents a command that modifies source files by replacing detected secrets.

Skill content
node scanner.js redact ./src/config.js --replace-with "[REDACTED]"
Recommendation

Review diffs and keep backups or use version control before running redaction commands.

NoteHigh Confidence
ASI10: Rogue Agents
What this means

Future commits may be blocked or modified by scanner behavior even after the initial task is complete.

Why it was flagged

The skill documents installing a pre-commit hook that continues to run automatically after setup.

Skill content
node scanner.js hook --install
# Now every commit is scanned automatically
Recommendation

Install the hook only if you want persistent commit-time scanning, and know how to remove or disable it.