Sops

by bytesagain1

Encrypt, rotate, and manage application secrets securely. Use when scanning exposed credentials, monitoring expiry, reporting access, alerting on violations.

3.7k安全与合规未扫描2026年3月23日

安装

claude skill add --url github.com/openclaw/skills/tree/main/skills/bytesagain1/secret-encrypt

文档

Secret Encrypt

Secret Encrypt v2.0.0 is a sysops toolkit for scanning, monitoring, and managing encrypted secrets across your infrastructure. It provides a thorough CLI with timestamped logging, multi-format data export, and full activity history tracking for security operations.

Commands

All commands accept optional <input> arguments. When called without arguments, they display the 20 most recent entries from their respective logs. When called with input, they record a new timestamped entry.

CommandUsageDescription
scansecret-encrypt scan [input]Scan for exposed secrets or credentials
monitorsecret-encrypt monitor [input]Monitor secret rotation and expiry status
reportsecret-encrypt report [input]Generate or log security reports
alertsecret-encrypt alert [input]Log or view security alerts and violations
topsecret-encrypt top [input]Show top-level security metrics or entries
usagesecret-encrypt usage [input]Track secret usage patterns and access
checksecret-encrypt check [input]Check encryption status or validate secrets
fixsecret-encrypt fix [input]Apply fixes for detected security issues
cleanupsecret-encrypt cleanup [input]Clean up expired or orphaned secrets
backupsecret-encrypt backup [input]Backup encrypted secrets and configurations
restoresecret-encrypt restore [input]Restore secrets from a previous backup
logsecret-encrypt log [input]View or add entries to the operations log
benchmarksecret-encrypt benchmark [input]Benchmark encryption/decryption performance
comparesecret-encrypt compare [input]Compare secret states across environments

Utility Commands

CommandUsageDescription
statssecret-encrypt statsShow summary statistics across all log files
export <fmt>secret-encrypt export json|csv|txtExport all data in JSON, CSV, or plain text format
search <term>secret-encrypt search <term>Search across all log entries (case-insensitive)
recentsecret-encrypt recentShow the 20 most recent activity entries
statussecret-encrypt statusHealth check — version, data dir, entry count, disk usage
helpsecret-encrypt helpShow full command reference
versionsecret-encrypt versionPrint version string (secret-encrypt v2.0.0)

Data Storage

All data is stored locally in ~/.local/share/secret-encrypt/:

  • history.log — Master activity log with timestamps for every operation
  • scan.log, monitor.log, alert.log, etc. — Per-command log files storing timestamp|input entries
  • export.json, export.csv, export.txt — Generated export files

Each entry is stored in pipe-delimited format: YYYY-MM-DD HH:MM|value. The data directory is created automatically on first use.

Requirements

  • Bash 4.0+ (uses set -euo pipefail, local variables)
  • Standard Unix tools: date, wc, du, tail, grep, sed, basename, cat
  • No external dependencies, API keys, or network access required
  • Works on Linux, macOS, and WSL

When to Use

  1. Scanning for exposed credentials — Use scan to detect leaked API keys, tokens, or passwords in your codebase or environment
  2. Monitoring secret rotation schedules — Use monitor to track which secrets are due for rotation and log expiry warnings
  3. Auditing secret access and usage — Use usage and report to produce structured audit trails for compliance reviews
  4. Backing up and restoring secrets — Use backup and restore to safely archive encrypted secrets before infrastructure changes
  5. Benchmarking encryption performance — Use benchmark to measure and compare encryption/decryption speeds across different configurations

Examples

bash
# Scan a project for exposed secrets
secret-encrypt scan /path/to/project

# Monitor secret rotation status
secret-encrypt monitor "API keys expiring in 7 days"

# Log a security alert
secret-encrypt alert "Exposed token found in public repo"

# Check encryption status
secret-encrypt check production-secrets.enc

# Backup current secrets
secret-encrypt backup "pre-migration snapshot"

# Restore from backup
secret-encrypt restore "pre-migration snapshot"

# Benchmark encryption performance
secret-encrypt benchmark "AES-256 vs ChaCha20"

# Clean up expired secrets
secret-encrypt cleanup "remove tokens older than 90 days"

# Export all history as JSON
secret-encrypt export json

# Search for past scan results
secret-encrypt search "API key"

# View summary statistics
secret-encrypt stats

Output

All commands output structured text to stdout. Use standard shell redirection to capture output:

bash
secret-encrypt stats > summary.txt
secret-encrypt export json  # writes to ~/.local/share/secret-encrypt/export.json

Powered by BytesAgain | bytesagain.com | hello@bytesagain.com

相关 Skills

安全专家

by alirezarezvani

Universal
热门

覆盖威胁建模、漏洞评估、安全架构设计、代码审计与渗透测试,内置 STRIDE、OWASP、加密模式和安全扫描流程,适合系统设计评审与上线前安全排查。

安全专家把威胁建模、漏洞分析到渗透测试串成一套流程,内置 STRIDE 与 OWASP 指南,做安全设计和排查更省心。

安全与合规
未扫描9.0k

安全运营

by alirezarezvani

Universal
热门

覆盖应用安全、漏洞管理与合规审计,支持代码/依赖扫描、CVE 评估、Secrets 检测和安全自动化,适合做安全基线落地、漏洞响应、审计检查与安全开发治理。

应用安全、漏洞管理和合规检查一套打通,还能自动化扫描与响应,帮团队更早发现并收敛风险。

安全与合规
未扫描9.0k

安全审计

by alirezarezvani

Universal
热门

安装前审计 Claude Code Skill 的代码执行、Prompt 注入和依赖供应链风险,支持本地目录或 Git 仓库扫描,输出 PASS/WARN/FAIL 结论及修复建议

把代码审查、漏洞扫描和合规检查串成一条线,帮团队更早发现风险,做安全治理更省心。

安全与合规
未扫描9.0k

相关 MCP 服务

搜索和分析 Sentry 错误报告,辅助调试。

把零散的 Sentry 错误报告变成可检索线索,帮你在海量报错里更快定位线上故障,排障调试明显省时。

安全与合规
616

为 AI agents 提供安全层:拦截 prompt injection、识别伪造 packages,并扫描漏洞风险。

给 AI Agent 补上关键安全层,能拦截 prompt 注入、识别伪造包并扫描漏洞风险,把防护前置更省心。

安全与合规
92

强化安全性的 NotebookLM MCP,集成 post-quantum encryption,提升数据防护能力。

安全与合规
47

评论