Skip to content

dremonkey23/gitguard-skill

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 

Repository files navigation

GitGuard

Scan GitHub repositories and local directories for exposed secrets before attackers find them first.

Built for AI agents running on OpenClaw / LarryBrain. Drop it into your workflow to audit any codebase for leaked credentials, API keys, tokens, and passwords — in seconds.


What It Detects

Type Severity
AWS Access Key ID CRITICAL
GitHub Personal Access Tokens CRITICAL
OpenAI / Anthropic API Keys CRITICAL
Stripe Live Secret Keys CRITICAL
Private SSH / TLS Keys CRITICAL
Database URLs with credentials CRITICAL
Google API Keys HIGH
Slack Tokens HIGH
Twilio Account SIDs HIGH
Generic API key / secret assignments HIGH
JWT Tokens MEDIUM
Bearer Tokens MEDIUM

Quick Start

Scan a GitHub repo (Windows)

.\scan-repo.ps1 -Target https://github.com/owner/repo

Scan a private repo (with token)

.\scan-repo.ps1 -Target https://github.com/owner/repo -GithubToken ghp_yourtoken

Scan a local directory (Windows)

.\scan-repo.ps1 -Target C:\projects\myapp

Linux / macOS

bash scan-repo.sh https://github.com/owner/repo
bash scan-repo.sh /path/to/local/project

Output Example

=================================================
  GITGUARD REPORT
=================================================
  Files scanned : 12
  Files skipped : 3
  Total findings: 3
-------------------------------------------------
  CRITICAL : 1
  HIGH     : 2
  MEDIUM   : 0
=================================================

[CRITICAL] AWS Access Key ID
  File    : config/.env
  Line    : 7
  Preview : AWS_ACCESS_KEY_ID=AKIA[REDACTED]

[HIGH] Generic API Key Assignment
  File    : src/api.js
  Line    : 14
  Preview : const apiKey = "sk-[REDACTED]..."

  GitGuard Score: 0 / 100

REMEDIATION STEPS:
  1. Rotate ALL exposed credentials immediately
  2. Move secrets to environment variables or a secrets manager
  ...

Scoring

Score Status
100 Clean — no secrets found
80-99 Low risk — review medium findings
60-79 Moderate risk — rotate high-severity creds
0-59 Critical — immediate action required

Notes

  • GitHub API: 60 req/hour unauthenticated, 5000/hour with token
  • Binary files, images, lock files, and build dirs skipped automatically
  • For large repos, always provide a GitHub token

Built by @drizzy8423 | Powered by LarryBrain

About

Scan GitHub repos and local directories for exposed secrets, API keys, and credentials. LarryBrain skill.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors