Loading...
Loading...
Scan the codebase for potential secret leaks including API keys, tokens, passwords, hardcoded project IDs, and sensitive identifiers. Use when the user says "check for secrets", "scan for leaks", "security check", or before committing sensitive changes.
npx skill4agent add nozomi-koborinai/koborin-ai check-secrets['\"]?[A-Z0-9_]{20,}['\"]?Bearer\s+[A-Za-z0-9\-._~+/]+=*-----BEGIN (RSA |EC |OPENSSH )?PRIVATE KEY-----client_secret['\"]?\s*[:=]\s*['\"]?[A-Za-z0-9\-_]{20,}"type":\s*"service_account"AKIA[0-9A-Z]{16}koborin-ai@koborin\.aiprocess.env.$\{TF_VAR_<PROJECT_ID>YOUR_API_KEYdummyexample__tests__/*.test.ts*.spec.tsgit ls-filesgit ls-files | grep -v -E '\.(png|jpg|jpeg|gif|svg|woff|woff2|ttf|eot|ico|pdf)$' | \
grep -v -E '^(node_modules|\.next|dist|build|coverage)/'process.env.TF_VAR_.env.example.env.template<...>YOUR_...REPLACE_MECRITICAL: Potential private key detected
File: infra/shared/main.tf
Line: 42
Match: -----BEGIN PRIVATE KEY-----
WARNING: Hardcoded project ID
File: app/src/lib/api-client.ts
Line: 15
Match: const PROJECT = "koborin-ai"
Summary:
- Critical: 1 finding(s)
- Warning: 1 finding(s)
Review these findings before committing.koborin-aikoborin-aiinfra/README.mdapp/src/