Pentest Secrets Exposure
This skill identifies potential secret exposure risks during penetration tests by analyzing application logs and configurations for leaked credentials.
Install on your platform
We auto-selected Claude Code based on this skill’s supported platforms.
Run in terminal (recommended)
claude mcp add pentest-secrets-exposure npx -- -y @trustedskills/pentest-secrets-exposure
Or manually add to ~/.claude/settings.json
{
"mcpServers": {
"pentest-secrets-exposure": {
"command": "npx",
"args": [
"-y",
"@trustedskills/pentest-secrets-exposure"
]
}
}
}Requires Claude Code (claude CLI). Run claude --version to verify your install.
About This Skill
What it does
This skill, pentest-secrets-exposure, allows AI agents to identify and extract secrets from various file types commonly used in penetration testing engagements. It can parse files like .env, .bashrc, .zshrc, and configuration files (e.g., YAML, JSON) to locate potential sensitive information such as API keys, passwords, and database credentials. The skill aims to automate the tedious process of manual secret hunting during security assessments.
When to use it
- Automated Reconnaissance: Quickly scan a compromised server or repository for exposed secrets during an initial penetration test phase.
- Code Review Assistance: Integrate into code review workflows to automatically flag potential secret exposures in new or modified files.
- Incident Response: Rapidly identify leaked credentials following a suspected data breach.
- Configuration Audit: Analyze configuration files across infrastructure for unintentional exposure of sensitive information.
Key capabilities
- Parses
.env,.bashrc,.zshrcfiles. - Supports YAML and JSON file parsing.
- Identifies API keys, passwords, and database credentials within parsed files.
Example prompts
- "Find all secrets in this .env file: [file content]"
- "Scan the contents of
/path/to/config.yamlfor exposed API keys." - "Extract any passwords or usernames from these bash scripts: [script content]"
Tips & gotchas
- The skill's effectiveness depends on the format and structure of the files being analyzed; complex or obfuscated secrets may not be detected.
- Ensure the AI agent has appropriate permissions to access and read the target files.
Tags
TrustedSkills Verification
Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.
Security Audits
| Gen Agent Trust Hub | Pass |
| Socket | Pass |
| Snyk | Pass |
🌐 Community
Passed automated security scans.