Sops
by bytesagain1
Encrypt, rotate, and manage application secrets securely. Use when scanning exposed credentials, monitoring expiry, reporting access, alerting on violations.
安装
claude skill add --url github.com/openclaw/skills/tree/main/skills/bytesagain1/secret-encrypt文档
Secret Encrypt
Secret Encrypt v2.0.0 is a sysops toolkit for scanning, monitoring, and managing encrypted secrets across your infrastructure. It provides a thorough CLI with timestamped logging, multi-format data export, and full activity history tracking for security operations.
Commands
All commands accept optional <input> arguments. When called without arguments, they display the 20 most recent entries from their respective logs. When called with input, they record a new timestamped entry.
| Command | Usage | Description |
|---|---|---|
scan | secret-encrypt scan [input] | Scan for exposed secrets or credentials |
monitor | secret-encrypt monitor [input] | Monitor secret rotation and expiry status |
report | secret-encrypt report [input] | Generate or log security reports |
alert | secret-encrypt alert [input] | Log or view security alerts and violations |
top | secret-encrypt top [input] | Show top-level security metrics or entries |
usage | secret-encrypt usage [input] | Track secret usage patterns and access |
check | secret-encrypt check [input] | Check encryption status or validate secrets |
fix | secret-encrypt fix [input] | Apply fixes for detected security issues |
cleanup | secret-encrypt cleanup [input] | Clean up expired or orphaned secrets |
backup | secret-encrypt backup [input] | Backup encrypted secrets and configurations |
restore | secret-encrypt restore [input] | Restore secrets from a previous backup |
log | secret-encrypt log [input] | View or add entries to the operations log |
benchmark | secret-encrypt benchmark [input] | Benchmark encryption/decryption performance |
compare | secret-encrypt compare [input] | Compare secret states across environments |
Utility Commands
| Command | Usage | Description |
|---|---|---|
stats | secret-encrypt stats | Show summary statistics across all log files |
export <fmt> | secret-encrypt export json|csv|txt | Export all data in JSON, CSV, or plain text format |
search <term> | secret-encrypt search <term> | Search across all log entries (case-insensitive) |
recent | secret-encrypt recent | Show the 20 most recent activity entries |
status | secret-encrypt status | Health check — version, data dir, entry count, disk usage |
help | secret-encrypt help | Show full command reference |
version | secret-encrypt version | Print version string (secret-encrypt v2.0.0) |
Data Storage
All data is stored locally in ~/.local/share/secret-encrypt/:
history.log— Master activity log with timestamps for every operationscan.log,monitor.log,alert.log, etc. — Per-command log files storingtimestamp|inputentriesexport.json,export.csv,export.txt— Generated export files
Each entry is stored in pipe-delimited format: YYYY-MM-DD HH:MM|value. The data directory is created automatically on first use.
Requirements
- Bash 4.0+ (uses
set -euo pipefail,localvariables) - Standard Unix tools:
date,wc,du,tail,grep,sed,basename,cat - No external dependencies, API keys, or network access required
- Works on Linux, macOS, and WSL
When to Use
- Scanning for exposed credentials — Use
scanto detect leaked API keys, tokens, or passwords in your codebase or environment - Monitoring secret rotation schedules — Use
monitorto track which secrets are due for rotation and log expiry warnings - Auditing secret access and usage — Use
usageandreportto produce structured audit trails for compliance reviews - Backing up and restoring secrets — Use
backupandrestoreto safely archive encrypted secrets before infrastructure changes - Benchmarking encryption performance — Use
benchmarkto measure and compare encryption/decryption speeds across different configurations
Examples
# Scan a project for exposed secrets
secret-encrypt scan /path/to/project
# Monitor secret rotation status
secret-encrypt monitor "API keys expiring in 7 days"
# Log a security alert
secret-encrypt alert "Exposed token found in public repo"
# Check encryption status
secret-encrypt check production-secrets.enc
# Backup current secrets
secret-encrypt backup "pre-migration snapshot"
# Restore from backup
secret-encrypt restore "pre-migration snapshot"
# Benchmark encryption performance
secret-encrypt benchmark "AES-256 vs ChaCha20"
# Clean up expired secrets
secret-encrypt cleanup "remove tokens older than 90 days"
# Export all history as JSON
secret-encrypt export json
# Search for past scan results
secret-encrypt search "API key"
# View summary statistics
secret-encrypt stats
Output
All commands output structured text to stdout. Use standard shell redirection to capture output:
secret-encrypt stats > summary.txt
secret-encrypt export json # writes to ~/.local/share/secret-encrypt/export.json
Powered by BytesAgain | bytesagain.com | hello@bytesagain.com
相关 Skills
安全专家
by alirezarezvani
覆盖威胁建模、漏洞评估、安全架构设计、代码审计与渗透测试,内置 STRIDE、OWASP、加密模式和安全扫描流程,适合系统设计评审与上线前安全排查。
✎ 安全专家把威胁建模、漏洞分析到渗透测试串成一套流程,内置 STRIDE 与 OWASP 指南,做安全设计和排查更省心。
安全运营
by alirezarezvani
覆盖应用安全、漏洞管理与合规审计,支持代码/依赖扫描、CVE 评估、Secrets 检测和安全自动化,适合做安全基线落地、漏洞响应、审计检查与安全开发治理。
✎ 应用安全、漏洞管理和合规检查一套打通,还能自动化扫描与响应,帮团队更早发现并收敛风险。
安全审计
by alirezarezvani
安装前审计 Claude Code Skill 的代码执行、Prompt 注入和依赖供应链风险,支持本地目录或 Git 仓库扫描,输出 PASS/WARN/FAIL 结论及修复建议
✎ 把代码审查、漏洞扫描和合规检查串成一条线,帮团队更早发现风险,做安全治理更省心。
相关 MCP 服务
by Sentry
搜索和分析 Sentry 错误报告,辅助调试。
✎ 把零散的 Sentry 错误报告变成可检索线索,帮你在海量报错里更快定位线上故障,排障调试明显省时。
by sinewaveai
为 AI agents 提供安全层:拦截 prompt injection、识别伪造 packages,并扫描漏洞风险。
✎ 给 AI Agent 补上关键安全层,能拦截 prompt 注入、识别伪造包并扫描漏洞风险,把防护前置更省心。
by pantheon-security
强化安全性的 NotebookLM MCP,集成 post-quantum encryption,提升数据防护能力。