raccoon-audit
npx skills add https://github.com/autumnsgrove/groveengine --skill raccoon-audit
Agent 安装分布
Skill 文档
Raccoon Audit ð¦
The raccoon is curious. It lifts every rock, peers into every crevice, washes every object to see what it truly is. Nothing escapes those clever paws. What looks clean on the surface reveals its secrets under inspection. The raccoon finds what others missâsecrets buried in commits, vulnerabilities hiding in dependencies, mess that accumulated while no one was watching.
When to Activate
- User asks to “audit security” or “check for secrets”
- User says “clean this up” or “sanitize before deploy”
- User calls
/raccoon-auditor mentions raccoon/cleanup - Before deploying to production (security sweep)
- When inheriting a codebase (unknown risks)
- After security incidents (post-mortem audit)
- Removing unused code, dependencies, or features
- Preparing for open source release (scrubbing internals)
Pair with: spider-weave for auth security, beaver-build for testing security fixes
The Audit
RUMMAGE â INSPECT â SANITIZE â PURGE â VERIFY
â â â â â
Search Examine Cleanse Remove Confirm
Everything Closely Contaminated Dead Clean
Phase 1: RUMMAGE
Little paws lift the rocks, curious eyes peer underneath…
Systematic search for things that don’t belong:
Secret Detection:
# Search for common secret patterns
grep -r "api_key\|apikey\|api-key" . --include="*.{js,ts,py,json,yaml,yml,env,md}" 2>/dev/null | head -20
grep -r "password\|passwd\|pwd" . --include="*.{js,ts,py,json,yaml,yml,env}" 2>/dev/null | head -20
grep -r "secret\|token\|private_key" . --include="*.{js,ts,py,json,yaml,yml,env}" 2>/dev/null | head -20
grep -r "AKIA[0-9A-Z]{16}" . 2>/dev/null # AWS access keys
grep -r "ghp_[a-zA-Z0-9]{36}" . 2>/dev/null # GitHub personal tokens
Common Hiding Spots:
.envfiles (should be in.gitignore)config.jsonwith hardcoded values- Test fixtures with real credentials
- Documentation examples that look too real
- Commented-out code containing keys
- Git history (check
git log -pfor deleted secrets)
Dependency Check:
# Check for known vulnerabilities
npm audit
pip audit # if using Python
Output: Inventory of potential secrets, vulnerabilities, and suspicious patterns found
Phase 2: INSPECT
The raccoon washes the object, turning it over in careful paws…
Examine findings to separate real risks from false positives:
Secret Validation: For each potential secret found:
- Is it a real secret? â Test if the key/token works
- Is it active? â Check creation date, last used
- What’s the blast radius? â What can this access?
- How exposed? â Public repo, internal, just local?
Vulnerability Assessment:
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ
â RISK EVALUATION MATRIX â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ¤
â CRITICAL â Active secrets in public repos â
â â SQL injection vulnerabilities â
â â Remote code execution paths â
ââââââââââââââ¼âââââââââââââââââââââââââââââââââââââââââââââââââ¤
â HIGH â Dependencies with known CVEs â
â â Weak cryptography (MD5, SHA1) â
â â Missing authentication on admin endpoints â
ââââââââââââââ¼âââââââââââââââââââââââââââââââââââââââââââââââââ¤
â MEDIUM â Information disclosure in error messages â
â â Missing rate limiting â
â â Verbose logging of sensitive data â
ââââââââââââââ¼âââââââââââââââââââââââââââââââââââââââââââââââââ¤
â LOW â Outdated dependencies (no known CVEs) â
â â Unused code/dependencies â
â â Comments containing internal details â
ââââââââââââââ´âââââââââââââââââââââââââââââââââââââââââââââââââ
Code Smell Inspection:
- Functions that bypass security checks
- Debug flags left enabled
- Hardcoded URLs that should be configurable
- TODO comments about security issues
- Disabled tests (especially security-related ones)
Output: Prioritized list of confirmed issues with severity ratings
Phase 3: SANITIZE
Contaminated objects get scrubbed until they gleam…
Clean up the mess without breaking functionality:
Secret Rotation (if exposed):
# 1. Revoke the exposed secret immediately
curl -X DELETE https://api.service.com/keys/EXPOSED_KEY_ID \
-H "Authorization: Bearer ADMIN_TOKEN"
# 2. Generate new secret
NEW_KEY=$(curl -X POST https://api.service.com/keys \
-H "Authorization: Bearer ADMIN_TOKEN" | jq -r '.key')
# 3. Update configuration (environment variables, not code!)
echo "SERVICE_API_KEY=$NEW_KEY" >> .env.local
Code Sanitization:
// BEFORE: Secret in code
const API_KEY = 'sk-live-abc123xyz789';
// AFTER: Environment variable
const API_KEY = process.env.SERVICE_API_KEY;
if (!API_KEY) {
throw new Error('SERVICE_API_KEY environment variable required');
}
Security Hardening:
// Add input validation
function sanitizeInput(input: string): string {
return input.replace(/[<>\"']/g, '');
}
// Add rate limiting
const rateLimiter = new Map<string, number[]>();
// Remove debug endpoints
// DELETE: app.get('/debug/users', ...)
Dependency Updates:
# Update vulnerable packages
npm update package-name
# or
pip install --upgrade package-name
# Verify fix
npm audit # Should show 0 vulnerabilities
Output: Clean code with secrets externalized, vulnerabilities patched
Phase 4: PURGE
What doesn’t belong gets carried away, never to return…
Remove the harmful remnants:
Git History Cleaning (if secrets were committed):
# Use BFG Repo-Cleaner or git-filter-branch
# WARNING: This rewrites history - coordinate with team!
# BFG approach (recommended):
bfg --delete-files '.*env' --replace-text secrets.txt my-repo.git
# Or specific file cleanup:
git filter-branch --force --index-filter \
'git rm --cached --ignore-unmatch path/to/secret-file' \
--prune-empty --tag-name-filter cat -- --all
Dead Code Removal:
# Find unused exports
npx ts-prune # TypeScript
# Find unused dependencies
npx depcheck
# Remove with confidence after tests pass
git rm src/old-feature/
npm uninstall unused-package
Environment Cleanup:
- Remove old API keys from services
- Delete test accounts created with real credentials
- Clear CI/CD cache if it contains secrets
- Rotate database credentials if exposed
Documentation Updates:
- Remove internal URLs from public docs
- Scrub employee names/IDs from examples
- Update architecture diagrams (remove sensitive details)
Output: Clean repository, fresh credentials, purged history
Phase 5: VERIFY
The raccoon washes its paws, inspecting them one last time…
Confirm everything is clean and stays clean:
Automated Verification:
# Re-run secret scan - should find nothing
grep -r "sk-live\|sk-test" . --include="*.{js,ts,json}" 2>/dev/null
# Security tests pass
npm run test:security
# No new vulnerabilities
npm audit --audit-level=moderate
Manual Checks:
- Application starts without hardcoded secrets
- All environment variables documented (not their values!)
- Test suite passes
- No sensitive data in logs
- Error messages don’t reveal internals
Preventive Measures:
# Install pre-commit hooks
npm install --save-dev husky
npx husky add .husky/pre-commit "npm run lint && npm run security-check"
# Add to CI/CD pipeline
# .github/workflows/security.yml
- name: Security Scan
run: |
npm audit --audit-level=moderate
npx secretlint "**/*"
Verification Report:
## ð¦ RACCOON AUDIT COMPLETE
### Secrets Found & Fixed
| Location | Severity | Action Taken |
|----------|----------|--------------|
| config.ts | CRITICAL | Moved to env var, rotated key |
| test/fixtures | HIGH | Replaced with mock data |
| README.md | MEDIUM | Removed internal URL |
### Dependencies
- 3 vulnerabilities patched
- 2 unused packages removed
- All packages up to date
### Verification
- [x] No secrets in current codebase
- [x] Git history cleaned (force push required)
- [x] Pre-commit hooks installed
- [x] All tests passing
Output: Clean bill of health with preventive measures in place
Raccoon Rules
Curiosity
Inspect everything. The raccoon doesn’t assumeâ it verifies. That “harmless” test file might contain production credentials.
Thoroughness
Wash every object. Half-cleaned secrets are still exposed secrets. Don’t stop at the surface.
Safety
Handle contaminated items carefully. When rotating secrets, ensure zero-downtime transitions. Don’t break production while fixing security.
Communication
Use investigative metaphors:
- “Lifting the rocks…” (searching thoroughly)
- “Washing the object…” (examining closely)
- “Scrubbing clean…” (sanitizing)
- “Carrying away…” (purging)
Anti-Patterns
The raccoon does NOT:
- Leave secrets in code with “TODO: remove this” comments
- Skip git history when secrets were committed
- Break production while rotating credentials
- Assume “it’s just a test key” means it’s safe
- Forget to update documentation after cleanup
- Trust that “someone else handled it”
Example Audit
User: “Audit the codebase before open sourcing”
Raccoon flow:
-
ð¦ RUMMAGE â “Found 3 API keys in config files, internal URLs in README, employee emails in test data, 12 TODO comments with internal ticket numbers”
-
ð¦ INSPECT â “One API key is active production key (CRITICAL). Others are test keys but still shouldn’t be public. Internal URLs expose infrastructure.”
-
ð¦ SANITIZE â “Move keys to env vars, replace URLs with example.com, scrub employee data, rewrite TODOs generically”
-
ð¦ PURGE â “Use BFG to clean git history of secrets, remove 2 unused dependencies, delete old deployment scripts”
-
ð¦ VERIFY â “Re-scan shows no secrets, all tests pass, pre-commit hooks installed to prevent future secrets”
Quick Decision Guide
| Situation | Action |
|---|---|
| Secret committed to git | Rotate immediately, clean history, force push |
| Vulnerability in dependency | Update to patched version, test, deploy |
| Hardcoded credentials | Move to environment variables, rotate keys |
| Dead code detected | Remove if tests pass, document if uncertain |
| Debug code in production | Remove endpoints, check logs for exposure |
| Preparing for open source | Full audit: secrets, internals, history, docs |
Integration with Other Skills
Before Audit:
bloodhound-scoutâ Understand codebase structure first
During Audit:
spider-weaveâ If auth/security system needs reviewbeaver-buildâ If writing security regression tests
After Audit:
panther-strikeâ If fixing specific security issues rapidlygrove-documentationâ Update security runbooks
Nothing stays hidden from paws that know how to look. ð¦