secret-leak-check

Secret & Privacy Leak Check Skill

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "secret-leak-check" with this command: npx skills add zenless-lab/skills/zenless-lab-skills-secret-leak-check

Secret & Privacy Leak Check Skill

Use this skill when reviewing repository changes for accidental exposure of sensitive data.

Skill Overview

This skill helps you detect:

  • Traditional secrets (tokens, API keys, credentials, connection strings).

  • Sensitive architecture details (database schema/internal topology details that should not be public).

  • Privacy data (personal email addresses, phone numbers, real names).

  • Leakage risks in commit messages.

  • Git identity/privacy misconfiguration in open-source contexts.

Core Principles

  • Scope first, then rules: Determine scan scope before running pattern checks.

  • Diff-first by default: Prioritize review of newly introduced risk.

  • Context-aware checks: Apply open-source/GitHub-specific checks only when conditions match.

  • Actionable results only: Report findings with severity, location, and remediation guidance.

Workflow

Step 1: Determine Scan Scope

Use references/scope_selection.md.

Default behavior when user gives no explicit scope:

  • Scan staged changes first (index vs HEAD , e.g., git diff --cached ).

  • Then scan unstaged working tree changes (working tree vs index, e.g., git diff ).

  • If no staged changes exist, scan all modified and untracked files in the working tree.

If user explicitly asks to scan all commits in a PR, expand scope to:

  • Current staged diff (index vs HEAD , if any).

  • Current unstaged/untracked working tree changes (working tree vs index, if any).

  • Every commit in the PR range, scanned commit-by-commit for leak content in diffs and commit messages.

If user explicitly asks to scan all files, ignore diff-only logic and scan the entire requested range. After scope is determined, build the concrete target file list. Do not report "full scan complete" unless all in-scope files satisfy both conditions.

If any files are excluded, list them explicitly with reason.

Step 2: Apply Detection Rules by Data Category

Use references/detection_rules.md.

Run category-specific checks for:

  • Secret tokens and API keys.

  • Credential-like material and high-risk config values.

  • Database schema/internal structure leakage.

  • PII and privacy data (email, phone, real name).

Step 3: Run Scenario-Specific Checks

Load only relevant references:

  • Diff/staging behavior: references/scenario_diff_and_staging.md

  • Full-repo/range behavior: references/scenario_full_scan.md

  • Commit message review: references/scenario_commit_messages.md

If the user does not explicitly disable it, also check commit messages in the active scan range. If user explicitly asks to scan all commits in a PR, commit message checks must cover each commit in that PR range.

Step 4: Validate Git Identity Privacy (Conditional)

Use references/scenario_git_identity_privacy.md.

Rules:

  • Only for open-source project scenario: check whether git config email may expose personal email.

  • Only when the remote is GitHub: check whether a GitHub privacy email (<id>+<username>@users.noreply.github.com ) is used when privacy is desired.

Step 5: Report Findings

Use references/reporting_template.md.

For each finding include:

  • Severity (critical /high /medium /low )

  • Category (secret /privacy /metadata )

  • Location (file path, diff hunk, or commit hash/message)

  • Why it is risky

  • Concrete remediation

Response Template

Scan Scope: [staged diff / working-tree-vs-HEAD / changed files / full scan / pr-all-commits]

Context Checks:

  • Open-source scenario: [yes/no]

  • GitHub remote detected: [yes/no]

Findings Summary:

  • Critical: [count]

  • High: [count]

  • Medium: [count]

  • Low: [count]

Findings:

  • [severity] [category] [location] — [risk] — [recommended fix]

Commit Message Review:

  • [result for checked commit range]

Git Identity Privacy Check:

  • [result and recommendation]

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

General

skill-expert

No summary provided by upstream source.

Repository SourceNeeds Review
General

cloud-init-crafter

No summary provided by upstream source.

Repository SourceNeeds Review
General

OpenClaw Skill Growth

Make OpenClaw Skills observable, diagnosable, and safely improvable over time. Use this when the user wants to maintain many SKILL.md files, inspect repeated...

Registry SourceRecently Updated
171Profile unavailable
General

Find Skills for ClawHub

Search for and discover OpenClaw skills from ClawHub (the official skill registry). Activate when user asks about finding skills, installing skills, or wants...

Registry SourceRecently Updated
2871Profile unavailable