secrets-env-manager
Audited by Socket on Mar 18, 2026
1 alert found:
Security[Skill Scanner] Credential file access detected All findings: [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] This repository fragment is consistent with its stated purpose: validating and documenting required environment variables, masking secrets in GitHub Actions logs, and integrating leak-detection tools. There is no evidence of intentional malicious behavior or obfuscation. Practical risks are operational (committing real .env files, accidentally echoing secrets) and a moderate supply-chain risk because third-party actions are referenced by branch names rather than pinned release tags. Recommend: pin third-party actions to specific commit SHAs or versioned releases, avoid committing real credentials to .env, and ensure all usage of secrets in scripts/commands is masked or avoided in logs.