Smithery Logo
MCPsSkillsDocsPricing
Login
Smithery Logo

Accelerating the Agent Economy

Resources

DocumentationPrivacy PolicySystem Status

Company

PricingAboutBlog

Connect

© 2026 Smithery. All rights reserved.

    naporin0624

    secret-scanner

    naporin0624/secret-scanner
    Security
    2
    1 installs

    About

    SKILL.md

    Install

    Install via Skills CLI

    or add to your agent
    • Claude Code
      Claude Code
    • Codex
      Codex
    • OpenClaw
      OpenClaw
    • Cursor
      Cursor
    • Amp
      Amp
    • GitHub Copilot
      GitHub Copilot
    • Gemini CLI
      Gemini CLI
    • Kilo Code
      Kilo Code
    • Junie
      Junie
    • Replit
      Replit
    • Windsurf
      Windsurf
    • Cline
      Cline
    • Continue
      Continue
    • OpenCode
      OpenCode
    • OpenHands
      OpenHands
    • Roo Code
      Roo Code
    • Augment
      Augment
    • Goose
      Goose
    • Trae
      Trae
    • Zencoder
      Zencoder
    • Antigravity
      Antigravity
    ├─
    ├─
    └─

    About

    Scans git repositories for hardcoded secrets, credentials, and API keys using Gitleaks. Returns findings with severity, location, and remediation steps...

    SKILL.md

    Secret Scanner

    Wrapper for Gitleaks to detect hardcoded secrets in git repositories.

    Prerequisites

    Gitleaks must be installed:

    # macOS
    brew install gitleaks
    
    # Go
    go install github.com/gitleaks/gitleaks/v8@latest
    
    # Docker
    docker pull zricethezav/gitleaks
    

    Usage

    # Scan current directory
    npx secret-scanner .
    
    # Scan with JSON output
    npx secret-scanner . --json
    
    # Scan specific path
    npx secret-scanner /path/to/repo
    
    # Check if gitleaks is installed
    npx secret-scanner --check
    

    Output Format

    {
      "tool": "gitleaks",
      "scanPath": ".",
      "findings": [
        {
          "id": "aws-access-key-id",
          "severity": "critical",
          "description": "AWS Access Key ID detected",
          "file": "config.js",
          "line": 15,
          "secret": "AKIA***REDACTED***",
          "commit": "abc1234",
          "author": "developer@example.com",
          "date": "2024-01-15T10:30:00Z"
        }
      ],
      "summary": {
        "total": 1,
        "critical": 1,
        "high": 0,
        "medium": 0,
        "low": 0
      }
    }
    

    Exit Codes

    • 0: No secrets found
    • 1: Secrets detected
    • 2: Tool not installed or error

    Severity Mapping

    Gitleaks Rule Severity
    aws-access-key-id critical
    private-key critical
    password high
    api-key high
    token medium
    generic-credential low

    CWE Coverage

    • CWE-798: Use of Hard-coded Credentials
    • CWE-259: Use of Hard-coded Password
    • CWE-321: Use of Hard-coded Cryptographic Key
    • CWE-312: Cleartext Storage of Sensitive Information
    Recommended Servers
    Infisical
    Infisical
    Vercel Grep
    Vercel Grep
    GitHub
    GitHub
    Repository
    naporin0624/claude-web-audit-plugins
    Files