Secret Scanner Pack

Trustedv1.0.0MITVerified88

by AgentNode · published 22 days ago · toolpack

Detect hardcoded secrets, API keys, and credentials in code.

Scan codebases for accidentally committed secrets, API keys, passwords, tokens, and private keys. Uses pattern matching and entropy analysis.

langchaincrewaigeneric

Quick Start

bash
agentnode install secret-scanner-pack

Usage

From package
python
from secret_scanner_pack.tool import run

result = run(
    action="scan_secrets",
    path="/workspace/my-project",
    recursive=True,
    exclude_patterns=["*.test.js", "node_modules/**", "__pycache__/**"]
)

print(f"Files scanned: {result['files_scanned']}")
print(f"Secrets found: {result['total_findings']}")
print(f"Severity breakdown: {result['severity_counts']}")

for finding in result["findings"]:
    print(f"\n[{finding['severity'].upper()}] {finding['type']}")
    print(f"  File: {finding['file']}:{finding['line']}")
    print(f"  Match: {finding['redacted_match']}")
    print(f"  Rule: {finding['rule_id']}")

Verification

high confidence88/100✔ Verified
smokeReturned valid result
+25/25
testsAuto-generated tests only
+8/15
importAll tools imported successfully
+15/15
installInstalled in 1.7s
+15/15
contractAll contract checks passed
+10/10
warningsNo warnings
0/0
determinismOutput consistency check
+5/5
reliability3/3 runs passed
+10/10

Package installs and imports correctly. runtime checks passed.

install1.7s
import65ms
smoke128ms
tests924ms

This package was executed and validated by AgentNode before listing. Install, import, and runtime checks passed.

Python 3.12.3ffmpegpopplertesseractuv

Last verified 18d ago· Runner v2.0.0

Use this when you need to...

  • Scan a codebase for accidentally committed AWS access keys
  • Detect hardcoded database connection strings in configuration files
  • Audit pull request diffs for leaked API tokens before merging
  • Find private SSH keys and certificates checked into repositories
  • Generate a compliance report of all detected credential exposures

README

Secret Scanner Pack

Detect hardcoded secrets, API keys, and credentials in code. Scan directories or git diffs for accidentally committed sensitive data before it reaches production.

Quick Start

agentnode install secret-scanner-pack
from secret_scanner_pack.tool import run

result = run(action="scan_secrets", path="/workspace/my-project")
print(f"Secrets found: {result['total_findings']}")

Usage

Scan a Directory

result = run(
    action="scan_secrets",
    path="/workspace/my-project",
    recursive=True,
    exclude_patterns=["node_modules/**", "*.min.js"]
)
for f in result["findings"]:
    print(f"[{f['severity']}] {f['type']} in {f['file']}:{f['line']}")

Pre-Commit Git Diff Scan

result = run(
    action="scan_secrets",
    path="/workspace/my-project",
    mode="git_diff",
    git_ref="HEAD"
)
if result["total_findings"] > 0:
    print("Commit blocked: secrets detected")

Custom Rule Patterns

result = run(
    action="scan_secrets",
    path="/workspace/my-project",
    custom_rules=[
        {"id": "internal-token", "pattern": r"INTERNAL_[A-Z0-9]{32}", "severity": "high"}
    ]
)

API Reference

CapabilityDescription
scan_secretsDetect API keys, tokens, passwords, and credentials in source code files

Detects: AWS keys, GitHub tokens, Slack tokens, private keys, database URIs, JWTs, and 50+ other patterns.

Requirements

No API keys required. All scanning runs locally.

License

MIT

Version History

Capabilities

secret_scanningscan_secretstool

Permissions

This package declares the following access levels. Review before installing.

Networknone
Filesystemworkspace_read
Code Executionnone
Data Accessinput_only
User Approvalnever
bash
agentnode install secret-scanner-pack

Files (3)

License

MIT

Stats

Downloads0
Installs0
Versionv1.0.0
Published3/16/2026
Channelstable
Typetoolpack
Entrypointsecret_scanner_pack.tool

Compatibility

Frameworks

langchaincrewaigeneric

Runtime

python

Python Version

>=3.10

Trust & Security

PublisherTrusted
SignatureNone
ProvenanceNone
Security Issues0

Publisher

A

AgentNode

@agentnode