ln-761-secret-scanner
0
总安装量
19
周安装量
安装命令
npx skills add https://github.com/levnikolaevich/claude-code-skills --skill ln-761-secret-scanner
Agent 安装分布
claude-code
16
antigravity
10
codex
10
cursor
10
gemini-cli
10
Skill 文档
Paths: File paths (
shared/,references/,../ln-*) are relative to skills repo root. If not found at CWD, locate this SKILL.md directory and go up one level for repo root.
Secret Scanner
Scans codebase for hardcoded secrets and credentials, returning structured findings for remediation.
Purpose & Scope
- Detect hardcoded secrets using available tools (gitleaks, trufflehog) or manual patterns
- Classify findings by severity (Critical/High/Medium/Low)
- Filter false positives via baseline and allowlists
- Provide remediation guidance per finding type
- Return normalized report to parent orchestrator (ln-760)
When to Use
- During project bootstrap (via ln-760-security-setup)
- Pre-commit hook validation
- CI/CD security pipeline
- Manual security audit
Workflow
Phase 1: Tool Detection
Step 1: Check Available Scanners
- Check if gitleaks is installed (preferred)
- Check if trufflehog is installed (alternative)
- If neither available: use manual pattern matching as fallback
Step 2: Load Configuration
- Load project
.gitleaks.tomlif exists (custom rules) - Load
.gitleaksbaselineif exists (known false positives) - If no config: use default patterns from
references/detection_patterns.md
Phase 2: Scan Execution
Step 1: Run Available Scanner
- Execute scanner against project root
- Capture output in structured format (JSON/SARIF preferred)
- If tool unavailable: run manual grep patterns for high-confidence secrets
Step 2: Parse Results
- Normalize output to common format: file, line, pattern, raw_match
- Preserve original severity if provided by tool
Phase 3: Report Generation
Step 1: Severity Classification
- Map findings to severity levels per
references/detection_patterns.md - Critical: AWS keys, private keys, JWT secrets
- High: Generic passwords, connection strings
- Medium: API keys (may be test data)
- Low: Potential secrets requiring manual review
Step 2: False Positive Filtering
- Apply baseline exclusions
- Apply allowlist patterns (placeholders, test data, docs)
- Mark filtered items as “excluded” with reason
Step 3: Build Report
- Group findings by severity
- Include file path, line number, pattern matched
- Do NOT include actual secret values in report
Phase 4: Remediation Guidance
Step 1: Attach Remediation Actions
- For each finding, attach remediation steps from
references/remediation_guide.md - For Critical findings: emphasize immediate rotation requirement
Step 2: Return Results
- Return structured findings list to orchestrator
- Include summary: total scanned, total found, by severity
Critical Rules
- Never log actual secret values – redact in all outputs
- Treat any found secret as compromised – rotation required for Critical
- Preserve baseline – do not remove existing baseline entries
- Pre-commit priority – recommend pre-commit hook if not configured
- Git history awareness – warn if secret may exist in history (requires git-filter-repo)
Definition of Done
- Scan completed using available tool or manual patterns
- Findings classified by severity
- False positives filtered via baseline/allowlist
- Remediation guidance attached to each finding
- Report returned in normalized format (no raw secret values)
- Critical findings flagged with rotation requirement
Reference Files
| File | Purpose |
|---|---|
references/detection_patterns.md |
Secret patterns by confidence level |
references/gitleaks_config_template.toml |
Template for project gitleaks config |
references/remediation_guide.md |
Rotation procedures by secret type |
Version: 2.0.0 Last Updated: 2026-01-10