audit-code
✓Verified·Scanned 2/18/2026
This skill is a repository security auditor that scans source code for hardcoded secrets, dangerous calls, and file-permission issues. It directs running python3 "$SKILL_DIR/scripts/audit_code.py" "$ARGUMENTS" and the included script reads target_path.rglob(".env*") and calls env_file.read_text(...) to inspect .env files.
from clawhub.ai·v0cd759e·35.8 KB·0 installs
Scanned from 1.0.0 at 0cd759e · Transparency log ↗
$ vett add clawhub.ai/itsnishi/audit-code
audit-code -- Project Code Security Review
Security-focused code review of project source code. Covers OWASP-style vulnerabilities, hardcoded secrets, dangerous function calls, and patterns relevant to AI-assisted development.
What to do
Run the auditor against the target path:
python3 "$SKILL_DIR/scripts/audit_code.py" "$ARGUMENTS"
If $ARGUMENTS is empty, default to $PROJECT_ROOT.
What it checks
- Hardcoded secrets -- API keys (AWS, GitHub, Stripe, OpenAI, Slack), tokens, private keys, connection strings, passwords
- Dangerous function calls -- eval, exec, subprocess with shell=True, child_process.exec, pickle deserialization, system(), gets(), etc.
- SQL injection -- String concatenation/interpolation in SQL queries
- Dependency risks -- Known hallucinated package names, unverified installations
- Sensitive files -- .env files committed to git, credential files in repo
- File permissions -- Overly permissive chmod patterns
- Exfiltration patterns -- Base64 encode + network send, DNS exfiltration, credential file reads
Output
Structured report with severity-ranked findings, file locations, and actionable remediation steps.
When to use
- Before committing or pushing code
- When reviewing third-party contributions or PRs
- As part of a periodic security audit of the codebase
- After AI-assisted code generation to verify no secrets or vulnerabilities were introduced