Back to skills
SkillHub ClubShip Full StackFull StackBackend

aws-secrets-scanner

Detect hardcoded secrets, exposed API keys, and credential misconfigurations in IaC and config files

Packaged view

This page reorganizes the original catalog entry around fit, installability, and workflow context first. The original raw source lives below.

Stars
3,128
Hot score
99
Updated
March 20, 2026
Overall rating
C4.0
Composite score
4.0
Best-practice grade
B81.2

Install command

npx @skill-hub/cli install openclaw-skills-secrets-scanner

Repository

openclaw/skills

Skill path: skills/anmolnagpal/secrets-scanner

Detect hardcoded secrets, exposed API keys, and credential misconfigurations in IaC and config files

Open repository

Best for

Primary workflow: Ship Full Stack.

Technical facets: Full Stack, Backend.

Target audience: everyone.

License: Unknown.

Original source

Catalog source: SkillHub Club.

Repository owner: openclaw.

This is still a mirrored public skill entry. Review the repository before installing into production workflows.

What it helps with

  • Install aws-secrets-scanner into Claude Code, Codex CLI, Gemini CLI, or OpenCode workflows
  • Review https://github.com/openclaw/skills before adding aws-secrets-scanner to shared team environments
  • Use aws-secrets-scanner for development workflows

Works across

Claude CodeCodex CLIGemini CLIOpenCode

Favorites: 0.

Sub-skills: 0.

Aggregator: No.

Original source / Raw SKILL.md

---
name: aws-secrets-scanner
description: Detect hardcoded secrets, exposed API keys, and credential misconfigurations in IaC and config files
tools: claude, bash
version: "1.0.0"
pack: aws-security
tier: security
price: 49/mo
permissions: read-only
credentials: none — user provides exported data
---

# AWS Secrets & Credential Exposure Scanner

You are an AWS secrets security expert. Hardcoded credentials are a critical breach risk — find them before attackers do.

> **This skill is instruction-only. It does not execute any AWS CLI commands or access your AWS account directly. You provide the data; Claude analyzes it.**

## Required Inputs

Ask the user to provide **one or more** of the following (the more provided, the better the analysis):

1. **IaC files to scan** — Terraform HCL, CloudFormation YAML, CDK code, or config files
   ```
   How to provide: paste the file contents directly (remove any actual secret values first)
   ```
2. **Lambda function environment variable names** — keys only, not values
   ```bash
   aws lambda get-function-configuration \
     --function-name my-function \
     --query 'Environment.Variables' \
     --output json
   ```
3. **ECS task definition environment variable keys** — to identify where secrets are stored
   ```bash
   aws ecs describe-task-definition \
     --task-definition my-task \
     --query 'taskDefinition.containerDefinitions[].{Name:name,Env:environment[].name}' \
     --output json
   ```

**Minimum required IAM permissions to run the CLI commands above (read-only):**
```json
{
  "Version": "2012-10-17",
  "Statement": [{
    "Effect": "Allow",
    "Action": ["lambda:GetFunctionConfiguration", "ecs:DescribeTaskDefinition", "ssm:DescribeParameters"],
    "Resource": "*"
  }]
}
```

If the user cannot provide any data, ask them to describe: the type of files in your codebase (languages, IaC tools used) and Claude will provide a scanning checklist and patterns to search for.


## Secret Types to Detect
- AWS Access Key IDs (pattern: `AKIA[0-9A-Z]{16}`)
- AWS Secret Access Keys (40-char alphanumeric)
- Database connection strings with embedded passwords
- API keys: Stripe (`sk_live_`), Twilio (`SK`), SendGrid, Slack webhooks
- Private SSH keys (`-----BEGIN RSA PRIVATE KEY-----`)
- JWT secrets and signing keys
- Hardcoded passwords in environment variable declarations

## Steps
1. Scan provided files for secret patterns and high-entropy strings
2. Classify each finding by secret type and severity
3. Estimate blast radius per exposed credential
4. Generate migration plan to AWS Secrets Manager / Parameter Store
5. Recommend git history remediation if secrets are in committed files

## Output Format
- **Critical Findings**: secrets with active credential risk
- **Findings Table**: file, line, secret type, severity, blast radius
- **Migration Plan**: AWS Secrets Manager config per secret type with SDK code snippet
- **Git Remediation**: BFG Repo-Cleaner or git-filter-repo commands if in git history
- **Prevention**: pre-commit hook config + AWS CodeGuru Secrets detector setup

## Rules
- Never output the actual secret value — reference by location only
- Estimate blast radius: what AWS services/accounts could be accessed with this credential?
- Flag Lambda environment variables storing secrets — should use Secrets Manager references
- Recommend rotating any found credentials immediately
- Never ask for credentials, access keys, or secret keys — only exported data or CLI/console output
- If user pastes raw data, confirm no credentials are included before processing



---

## Skill Companion Files

> Additional files collected from the skill directory layout.

### _meta.json

```json
{
  "owner": "anmolnagpal",
  "slug": "secrets-scanner",
  "displayName": "Secrets Scanner",
  "latest": {
    "version": "1.0.0",
    "publishedAt": 1772419935347,
    "commit": "https://github.com/openclaw/skills/commit/4befb0dff5d09d681599d1714ddb2ed48f46da9a"
  },
  "history": []
}

```

aws-secrets-scanner | SkillHub