safe-repo
SKILL.md
Safe Repository Check
Context
Security audit for sensitive data in repository. Check for credentials, API keys, company-specific information, and PII.
Workflow
- Run
bash scripts/scan-secrets.shto scan all tracked files for credential patterns (see references/patterns.md for full pattern list) - Check for sensitive tracked files (.env, secrets)
- Analyze git history for removed secrets
- Review
.gitignorefor proper patterns - Report findings (see assets/report-template.md)
Rules
- Only check git-tracked files (
git ls-files) - ignore local configs - Check current tracked files AND git history
- Filter false positives: minified JS, node_modules, test fixtures, docs
- Verify
.gitignorecovers sensitive patterns - Report tracked files with secrets and historical commits
- Never output actual secret values in report
Error Handling
- If
git ls-filesreturns nothing → verify the current directory is a git repository; rungit statusto confirm - If git history scan is slow → limit to last 100 commits with
git log --oneline -100 - If false positives are high → cross-reference against patterns in references/patterns.md before reporting
Weekly Installs
15
Repository
helderberto/skillsFirst Seen
Feb 13, 2026
Security Audits
Installed on
claude-code15
codex15
gemini-cli15
opencode15
trae-cn14
iflow-cli14