openclaw-sentry

Review·Scanned 2/17/2026

This skill scans agent workspaces for leaked credentials and high-risk files. It reads workspace files (including .env) and the OPENCLAW_WORKSPACE env var, and its documentation includes commands like python3 scripts/sentry.py scan that instruct running the scanner.

from clawhub.ai·v81495a7·18.6 KB·0 installs
Scanned from 1.0.1 at 81495a7 · Transparency log ↗
$ vett add clawhub.ai/atlaspa/openclaw-sentryReview findings below

OpenClaw Sentry

Secret scanner for OpenClaw, Claude Code, and any Agent Skills-compatible tool.

Scans workspace files for leaked API keys, tokens, passwords, private keys, and credentials — the secrets that agent workspaces silently accumulate.

Want automated countermeasures? Upgrade to Pro — auto-redaction, quarantine, and defense. Get Pro access.

The Problem

Agent workspaces accumulate secrets: API keys in config files, tokens in memory logs, passwords in environment files. A single leaked credential can compromise your entire infrastructure. Existing secret scanners work on git repos — nothing watches the agent workspace itself.

Install

# Clone
git clone https://github.com/AtlasPA/openclaw-sentry.git

# Copy to your workspace skills directory
cp -r openclaw-sentry ~/.openclaw/workspace/skills/

Usage

# Full secret scan
python3 scripts/sentry.py scan

# Check a single file
python3 scripts/sentry.py check MEMORY.md

# Quick status
python3 scripts/sentry.py status

All commands accept --workspace /path/to/workspace. If omitted, auto-detects from $OPENCLAW_WORKSPACE, current directory, or ~/.openclaw/workspace.

What It Detects

  • AWS — Access keys (AKIA...), secret access keys
  • GitHub — Personal access tokens (ghp_, gho_, ghs_, ghr_, github_pat_)
  • Slack — Bot/user tokens (xox...), webhook URLs
  • Stripe — Secret keys (sk_live_), publishable keys (pk_live_)
  • OpenAI — API keys (sk-...)
  • Anthropic — API keys (sk-ant-...)
  • Google — API keys (AIza...), OAuth client secrets
  • Azure — Storage account keys
  • Generic — API keys, secrets, passwords, bearer tokens, connection strings
  • Private Keys — PEM files, .key/.pem/.p12/.pfx extensions
  • Database URLs — PostgreSQL, MySQL, MongoDB, Redis with credentials
  • JWT Tokens — JSON Web Tokens in plain text
  • Environment Files — .env files with variables
  • .gitignore gaps — Missing patterns for common secret files

Free vs Pro

FeatureFreePro
Secret detection (25+ patterns)YesYes
High-risk file detectionYesYes
.env file scanningYesYes
.gitignore gap analysisYesYes
Auto-redact secrets in files-Yes
Quarantine leaking skills-Yes
Generate .gitignore rules-Yes
Move .env to vault path-Yes

Exit Codes

CodeMeaning
0Clean
1Warnings detected
2Critical secrets found

Requirements

  • Python 3.8+
  • No external dependencies (stdlib only)
  • Cross-platform: Windows, macOS, Linux

License

MIT