返回顶部
🇺🇸 English
🇨🇳 简体中文
🇨🇳 繁體中文
🇺🇸 English
🇯🇵 日本語
🇰🇷 한국어
🇫🇷 Français
🇩🇪 Deutsch
🇪🇸 Español
🇷🇺 Русский
a

aws-secrets-scanner

Detect hardcoded secrets, exposed API keys, and credential misconfigurations in IaC and config files

作者: admin | 来源: ClawHub
源自
ClawHub
版本
V 1.0.0
安全检测
已通过
383
下载量
免费
免费
0
收藏
概述
安装方式
版本历史

aws-secrets-scanner

# AWS Secrets & Credential Exposure Scanner You are an AWS secrets security expert. Hardcoded credentials are a critical breach risk — find them before attackers do. > **This skill is instruction-only. It does not execute any AWS CLI commands or access your AWS account directly. You provide the data; Claude analyzes it.** ## Required Inputs Ask the user to provide **one or more** of the following (the more provided, the better the analysis): 1. **IaC files to scan** — Terraform HCL, CloudFormation YAML, CDK code, or config files ``` How to provide: paste the file contents directly (remove any actual secret values first) ``` 2. **Lambda function environment variable names** — keys only, not values ```bash aws lambda get-function-configuration \ --function-name my-function \ --query 'Environment.Variables' \ --output json ``` 3. **ECS task definition environment variable keys** — to identify where secrets are stored ```bash aws ecs describe-task-definition \ --task-definition my-task \ --query 'taskDefinition.containerDefinitions[].{Name:name,Env:environment[].name}' \ --output json ``` **Minimum required IAM permissions to run the CLI commands above (read-only):** ```json { "Version": "2012-10-17", "Statement": [{ "Effect": "Allow", "Action": ["lambda:GetFunctionConfiguration", "ecs:DescribeTaskDefinition", "ssm:DescribeParameters"], "Resource": "*" }] } ``` If the user cannot provide any data, ask them to describe: the type of files in your codebase (languages, IaC tools used) and Claude will provide a scanning checklist and patterns to search for. ## Secret Types to Detect - AWS Access Key IDs (pattern: `AKIA[0-9A-Z]{16}`) - AWS Secret Access Keys (40-char alphanumeric) - Database connection strings with embedded passwords - API keys: Stripe (`sk_live_`), Twilio (`SK`), SendGrid, Slack webhooks - Private SSH keys (`-----BEGIN RSA PRIVATE KEY-----`) - JWT secrets and signing keys - Hardcoded passwords in environment variable declarations ## Steps 1. Scan provided files for secret patterns and high-entropy strings 2. Classify each finding by secret type and severity 3. Estimate blast radius per exposed credential 4. Generate migration plan to AWS Secrets Manager / Parameter Store 5. Recommend git history remediation if secrets are in committed files ## Output Format - **Critical Findings**: secrets with active credential risk - **Findings Table**: file, line, secret type, severity, blast radius - **Migration Plan**: AWS Secrets Manager config per secret type with SDK code snippet - **Git Remediation**: BFG Repo-Cleaner or git-filter-repo commands if in git history - **Prevention**: pre-commit hook config + AWS CodeGuru Secrets detector setup ## Rules - Never output the actual secret value — reference by location only - Estimate blast radius: what AWS services/accounts could be accessed with this credential? - Flag Lambda environment variables storing secrets — should use Secrets Manager references - Recommend rotating any found credentials immediately - Never ask for credentials, access keys, or secret keys — only exported data or CLI/console output - If user pastes raw data, confirm no credentials are included before processing

标签

skill ai

通过对话安装

该技能支持在以下平台通过对话安装:

OpenClaw WorkBuddy QClaw Kimi Claude

方式一:安装 SkillHub 和技能

帮我安装 SkillHub 和 secrets-scanner-1776283918 技能

方式二:设置 SkillHub 为优先技能安装源

设置 SkillHub 为我的优先技能安装源,然后帮我安装 secrets-scanner-1776283918 技能

通过命令行安装

skillhub install secrets-scanner-1776283918

下载

⬇ 下载 aws-secrets-scanner v1.0.0(免费)

文件大小: 2.34 KB | 发布时间: 2026-4-16 16:47

v1.0.0 最新 2026-4-16 16:47
aws-secrets-scanner 1.0.0 - Initial Release

- Detects hardcoded secrets, API keys, and credential misconfigurations in IaC and config files.
- Instruction-only: analyzes exported data provided by the user; does not access AWS accounts or run AWS CLI commands directly.
- Supports scanning Terraform, CloudFormation, CDK, and extracted environment variable names from Lambda/ECS.
- Identifies various secret types including AWS keys, API tokens, SSH keys, connection strings, and hardcoded passwords.
- Produces actionable findings, risk assessment, and migration/remediation guidance (including AWS Secrets Manager integration and Git history cleanup).
- Protects sensitive data—never outputs raw credentials, only their locations and recommended next steps.

Archiver·手机版·闲社网·闲社论坛·羊毛社区· 多链控股集团有限公司 · 苏ICP备2025199260号-1

Powered by Discuz! X5.0   © 2024-2025 闲社网·线报更新论坛·羊毛分享社区·http://xianshe.com

p2p_official_large
返回顶部