Loading...
Loading...
Safely inspect .env files by showing key names and clearly non-sensitive values while redacting anything that looks like a secret. Best-effort heuristic redaction (keyword block + token-pattern blocklist + Shannon-entropy check + value allowlist) — not a cryptographic guarantee. Use when you need to understand a project's environment configuration without exposing credentials.
npx skill4agent add jwa91/agentskills env-inspector.env<redacted>bash .agents/skills/env-inspector/scripts/env-safe-read.sh /path/to/.env.env*for f in $(find . -maxdepth 3 -name '.env*' -not -name '.env.example' -not -path '*/node_modules/*'); do
echo "--- $f ---"
bash .agents/skills/env-inspector/scripts/env-safe-read.sh "$f"
echo ""
doneKEY|SECRET|TOKEN|PASSWORD|PASS|CREDENTIAL|AUTH|PRIVATE|SIGNING|HASH|SALT|ENCRYPTION|JWT|BEARER|COOKIE|CSRF|SESSION|DSN|WEBHOOK_URLsk-…pk_live_…ghp_…github_pat_…eyJ…AKIA…xox[abprs]-…AIza…glpat-…npm_…dckr_pat_…@MY_PIN=hunter12PreToolUsehooks/path-gate.shenv-safe-read.sh$CLAUDE_PROJECT_DIR.env../etc/postgresql/.envhooks.claude/settings.jsonbashawksedjq