Exposed secret literal
- Finding
- File appears to expose a hardcoded API secret or token.
Security checks across static analysis, malware telemetry, and agentic risk
This skill has no executable behavior, but the published package includes a file it explicitly says should not be published, containing secret-like content.
This does not look like active malware because there is no code or install step, but the package should be reviewed before use because it includes a file that was supposed to be excluded. The publisher should remove secret.md and verify the ignore mechanism before republishing.
VirusTotal findings are pending for this skill version.
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Users receive content that was intended not to be published; if this were a real secret file, installing or sharing the package could expose private configuration or credentials.
The file is present in the supplied package even though it identifies itself as a file that should have been excluded, indicating a packaging or ignore-rule failure.
# SECRET — This file should NOT be published
Do not publish this package as-is. Remove secret.md, verify .clawhubignore behavior, republish, and rotate any real secrets if they were ever included.
The package may expose private-looking configuration examples and could confuse users about whether real credentials were leaked.
The included file contains a local private-looking path and an API-key-shaped value. The value is labeled fake and no code uses it, so this is a credential-exposure hygiene issue rather than proven account access.
vault_path: /Users/hsw/super/private/path api_key: this-is-fake-but-should-be-excluded
Keep secret-like examples out of published artifacts, use clearly non-secret placeholders, and ensure any real keys are revoked if accidentally published.