secrets-scan

Warn

Audited by Socket on Feb 21, 2026

1 alert found:

Security
SecurityMEDIUM
SKILL.md

[Skill Scanner] AWS access key detected All findings: [CRITICAL] hardcoded_secrets: AWS access key detected (HS002) [AITech 8.2] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] This skill is a legitimate local secrets-scanning and remediation helper. It reads repository files and git history, runs local searches and (optionally) third-party scanning tools, and writes reports and remediation instructions. There is no evidence of network exfiltration, obfuscated malicious code, or credential harvesting to external domains. The primary risks are operational and supply-chain: (1) remediation examples create plaintext files (passwords.txt) containing secrets which increases local exposure if mishandled; (2) it recommends destructive git history rewriting and force-pushing which can disrupt collaborators; (3) installation instructions for third-party tools are unpinned, raising long-term supply-chain risk; and (4) pre-commit hooks and scripts run local commands and may block automation or prompt users. Overall the code is functionally consistent with its purpose but carries moderate operational/security caveats that should be documented and guarded against. LLM verification: The skill implements legitimate secret-scanning behavior and remediation guidance. I found no embedded network exfiltration, backdoor, obfuscated payload, or direct credential-harvesting code. However, it includes several supply-chain and operational risks: unpinned third-party installs (pip/brew), suggestions to write secrets into a plaintext passwords.txt for replacement, CI steps that fetch full history, generation of reports that may contain secret matches, and git history rewrite/force-push

Confidence: 90%Severity: 85%
Audit Metadata
Analyzed At
Feb 21, 2026, 12:27 PM
Package URL
pkg:socket/skills-sh/manastalukdar%2Fclaude-devstudio%2Fsecrets-scan%2F@33f6889c76e3d546769416a350c975b04463e1bf