Find Credential Usage

🌐Community
by dalehurley Β· vlatest Β· Repository

This skill identifies how specific credentials are being utilized across your systems for improved security and compliance management.

Install on your platform

We auto-selected Claude Code based on this skill’s supported platforms.

1

Run in terminal (recommended)

terminal
claude mcp add find-credential-usage npx -- -y @trustedskills/find-credential-usage
2

Or manually add to ~/.claude/settings.json

~/.claude/settings.json
{
  "mcpServers": {
    "find-credential-usage": {
      "command": "npx",
      "args": [
        "-y",
        "@trustedskills/find-credential-usage"
      ]
    }
  }
}

Requires Claude Code (claude CLI). Run claude --version to verify your install.

About This Skill

What it does

This skill, find-credential-usage, helps locate and understand how credentials are being utilized within a system. It can identify where specific usernames or passwords appear in code or configuration files. This is valuable for security audits, troubleshooting access issues, and ensuring best practices around credential management.

When to use it

  • Security Audit: You need to quickly find all instances of a particular username or password used within your codebase.
  • Troubleshooting Access Errors: An application isn't working as expected, and you suspect incorrect credentials are being used somewhere.
  • Credential Rotation Planning: Before rotating passwords, you want to identify every location where the current password is in use.
  • Code Review: During a code review, you need to verify that sensitive information like API keys or database passwords aren't hardcoded.

Key capabilities

  • Credential identification
  • Location tracking within files
  • Support for various file types (implied)

Example prompts

  • "Find all uses of the password 'MySecretPassword' in this project."
  • "Where is the username 'adminUser' used?"
  • "Show me every location where an API key appears in these files."

Tips & gotchas

The effectiveness of this skill depends on having access to the relevant codebase or configuration files. It’s best suited for projects with well-defined file structures and clear credential usage patterns.

Tags

πŸ›‘οΈ

TrustedSkills Verification

Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates β€” what you install today is exactly what was reviewed and verified.

Security Audits

Gen Agent Trust HubPass
SocketPass
SnykPass

Details

Version
vlatest
License
Author
dalehurley
Installs
3

🌐 Community

Passed automated security scans.