secrets
Secrets Detection (SEC)
Analyze source code, configuration files, and git history for hardcoded credentials, API keys, tokens, private keys, and other sensitive material that should never appear in version control. Secrets in code are among the most immediately exploitable vulnerabilities -- a single leaked API key can lead to full account compromise within minutes.
Supported Flags
Read ../../shared/schemas/flags.md for the full flag specification. This skill
supports all cross-cutting flags. Key behaviors:
| Flag | Secrets-Specific Behavior |
|---|---|
--scope |
Default changed. Secrets analysis scans all file types including config, YAML, JSON, .env, scripts, and source code. |
--depth quick |
Scanners only (gitleaks/trufflehog), no manual pattern analysis. |
--depth standard |
Full file read of scoped files + Grep heuristics for patterns scanners miss. |
--depth deep |
Standard + scan git history for previously committed and removed secrets. |
--depth expert |
Deep + verify whether detected secrets are still active/valid, DREAD scoring. |
--severity |
Filter output. Most secrets findings are critical or high. |
--fix |
Generate remediation: remove secret, add to .gitignore, rotate credential. |
Detection Patterns
Read references/detection-patterns.md for the full pattern catalog with
language-specific examples, regex heuristics, and false positive guidance.
Pattern Summary:
- API keys and tokens hardcoded in source code
- Passwords and credentials in configuration files
- .env files committed to version control
- Private keys (RSA, EC, PGP) in repository
- Database connection strings with embedded credentials
- High-entropy strings matching secret patterns
Workflow
Step 1: Determine Scope
- Parse
--scopeflag (default:changed). - Resolve to a concrete file list.
- Include ALL file types -- secrets can appear anywhere:
.py,.js,.ts,.java,.go,.env,.yml,.yaml,.json,.xml,.toml,.ini,.cfg,.conf,.properties,.tf,.tfvars,.sh,.bash,.zsh,.dockerfile,docker-compose.*,*.pem,*.key. - Check for
.gitignorecoverage of sensitive file patterns.
Step 2: Check for Scanners
Detect available scanners in priority order:
| Scanner | Detect | Secrets Coverage |
|---|---|---|
| gitleaks | which gitleaks |
150+ secret patterns, git history scanning, custom rules |
| trufflehog | which trufflehog |
700+ credential detectors, live verification of found secrets |
| trivy | which trivy |
Secrets detection as part of broader filesystem scan |
Record which scanners are available and which are missing. If none are available, note: "No scanner available -- findings based on code pattern analysis only."
Step 3: Run Scanners
For each available scanner, run against the scoped files:
gitleaks detect --source <target> --report-format json --report-path /dev/stdout --no-banner
trufflehog filesystem --json <target>
At --depth deep, also scan git history:
gitleaks detect --source <target> --report-format json --report-path /dev/stdout --no-banner --log-opts="--all"
trufflehog git --json file://<target>
Normalize scanner output to the findings schema (see ../../shared/schemas/findings.md).
Use the severity mapping from ../../shared/schemas/scanners.md.
Step 4: Claude Analysis
Read each scoped file and analyze for secret patterns not caught by scanners:
- Identify secret-like values: Look for strings matching API key formats, base64-encoded credentials, high-entropy strings in assignment contexts.
- Check context: Is the value in a variable named
key,secret,token,password,credential,api_key, or similar? - Verify not placeholder: Exclude values like
YOUR_API_KEY_HERE,changeme,xxx,dummy,test,example,placeholder. - Check .gitignore: Are
.env,*.pem,*.key,credentials.jsonpatterns in.gitignore? Flag missing patterns. - Deduplicate: Merge Claude findings with scanner findings.
At --depth deep or --depth expert:
- Trace secret usage across files to map exposure surface.
- Check if secrets are loaded from environment variables (good) vs hardcoded (bad).
- Verify secret rotation practices (key age, rotation infrastructure).
Step 5: Report
Output findings using the format from ../../shared/schemas/findings.md.
Each finding must include:
- id:
SEC-001,SEC-002, etc. - title: Secret type and location (e.g., "AWS access key in config.py").
- severity: Based on secret type, exposure scope, and verification status.
- location: File, line, and masked snippet (NEVER include the full secret).
- description: What type of secret was found and how it is exposed.
- impact: What an attacker can access with this secret.
- fix: Remove from code, add to .gitignore, rotate credential, use env vars.
- references: CWE-798, CWE-321, CWE-312.
CRITICAL: Never output the actual secret value in findings. Always mask
the middle portion: AKIA****XMPL.
What to Look For
These are the primary secret patterns to detect. Each has detailed examples
and regex heuristics in references/detection-patterns.md.
- AWS access keys:
AKIA[0-9A-Z]{16}patterns in source code - Generic API keys: Long alphanumeric strings assigned to key/token variables
- Passwords in config:
password = "...",DB_PASSWORD, connection strings - Private keys:
-----BEGIN RSA PRIVATE KEY-----and similar PEM headers - OAuth/JWT secrets: Client secrets, signing keys, bearer tokens
- Cloud provider tokens: GCP service account keys, Azure connection strings
- .env files committed: Entire environment files with production secrets
- Git history secrets: Secrets that were committed then "removed" but remain in history
- High-entropy strings: Base64 or hex strings in suspicious contexts
- Connection strings: Database URIs with embedded username:password
Scanner Integration
Primary: gitleaks (fast, comprehensive pattern matching), trufflehog (live verification)
Secondary: trivy (secrets as part of broader scanning)
Fallback: Grep regex patterns from references/detection-patterns.md
When scanners are available, run them first and use Claude analysis to:
- Validate scanner findings (filter false positives like example values).
- Find secret patterns scanners miss (custom key formats, obfuscated secrets).
- Assess impact based on secret type and code context.
When no scanners are available, Claude performs full pattern-based analysis using
the Grep heuristics from references/detection-patterns.md and contextual code
reading. Report these findings with confidence: medium.
Output Format
Use finding ID prefix SEC (e.g., SEC-001, SEC-002).
All findings follow the schema in ../../shared/schemas/findings.md with:
references.cwe:"CWE-798"(hardcoded credentials) or"CWE-312"(cleartext storage)references.owasp:"A07:2021"(Identification and Authentication Failures)metadata.tool:"secrets"metadata.framework:"specialized"metadata.category:"SEC"
CWE Mapping by Secret Type:
| Secret Type | CWE | Typical Severity |
|---|---|---|
| Hardcoded password | CWE-798 | critical |
| API key in source | CWE-798 | critical |
| Private key committed | CWE-321 | critical |
| .env file committed | CWE-312 | high |
| Connection string with credentials | CWE-798 | critical |
| High-entropy string (unverified) | CWE-798 | medium |
| Missing .gitignore for secret files | CWE-312 | medium |
Summary Table
After all findings, output a summary:
| Secret Type | Critical | High | Medium | Low |
|--------------------|----------|------|--------|-----|
| API Keys/Tokens | | | | |
| Passwords | | | | |
| Private Keys | | | | |
| Connection Strings | | | | |
| .env / Config | | | | |
| Git History | | | | |
Followed by: top 3 priorities, scanner coverage notes, rotation recommendations, and overall assessment.