api-credentials-hygiene

Audits and hardens API credential handling (env vars, separation, rotation plan, least privilege, auditability). Use when integrating services or preparing production deployments where secrets must be managed safely.

533 stars

Best use case

api-credentials-hygiene is best used when you need a repeatable AI agent workflow instead of a one-off prompt.

Audits and hardens API credential handling (env vars, separation, rotation plan, least privilege, auditability). Use when integrating services or preparing production deployments where secrets must be managed safely.

Teams using api-credentials-hygiene should expect a more consistent output, faster repeated execution, less prompt rewriting.

When to use this skill

  • You want a reusable workflow that can be run more than once with consistent structure.

When not to use this skill

  • You only need a quick one-off answer and do not need a reusable workflow.
  • You cannot install or maintain the underlying files, dependencies, or repository context.

Installation

Claude Code / Cursor / Codex

$curl -o ~/.claude/skills/api-credentials-hygiene/SKILL.md --create-dirs "https://raw.githubusercontent.com/sundial-org/awesome-openclaw-skills/main/skills/api-credentials-hygiene/SKILL.md"

Manual Installation

  1. Download SKILL.md from GitHub
  2. Place it in .claude/skills/api-credentials-hygiene/SKILL.md inside your project
  3. Restart your AI agent — it will auto-discover the skill

How api-credentials-hygiene Compares

Feature / Agentapi-credentials-hygieneStandard Approach
Platform SupportNot specifiedLimited / Varies
Context Awareness High Baseline
Installation ComplexityUnknownN/A

Frequently Asked Questions

What does this skill do?

Audits and hardens API credential handling (env vars, separation, rotation plan, least privilege, auditability). Use when integrating services or preparing production deployments where secrets must be managed safely.

Where can I find the source code?

You can find the source code on GitHub using the link provided at the top of the page.

SKILL.md Source

# API credentials hygiene: env vars, rotation, least privilege, auditability

## PURPOSE
Audits and hardens API credential handling (env vars, separation, rotation plan, least privilege, auditability).

## WHEN TO USE
- TRIGGERS:
  - Harden the credentials setup for this integration and move secrets into env vars.
  - Design a key rotation plan for these APIs with minimal downtime.
  - Audit this service for least-privilege access and document what each key can do.
  - Create an environment variable map and a secure .env template for this project.
  - Set up credential separation for dev versus prod with clear audit trails.
- DO NOT USE WHEN…
  - You want to obtain keys without authorization or bypass security controls.
  - You need legal/compliance sign-off (this outputs technical documentation, not legal advice).

## INPUTS
- REQUIRED:
  - List of integrations/APIs and where credentials are currently stored/used.
  - Deployment context (local dev, server, container, n8n, etc.).
- OPTIONAL:
  - Current config files/redacted snippets (.env, compose, systemd, n8n creds list).
  - Org rules (rotation intervals, secret manager preference).
- EXAMPLES:
  - “Keys are hard-coded in a Node script and an n8n HTTP Request node.”
  - “We have dev and prod n8n instances and need separation.”

## OUTPUTS
- Credential map (service → env vars → scopes/permissions → owner → rotation cadence).
- Rotation runbook (steps + rollback).
- Least-privilege checklist and audit log plan.
- Optional: `.env` template (placeholders only).
Success = no secrets committed or embedded, permissions minimized, rotation steps documented, and auditability defined.


## WORKFLOW
1. Inventory credentials:
   - where stored, where used, and who owns them.
2. Define separation:
   - dev vs prod; human vs service accounts; per-integration boundaries.
3. Move secrets to env vars / secret manager references:
   - create an env var map and update config plan (no raw keys in code/workflows).
4. Least privilege:
   - for each API, enumerate required actions and reduce scopes/roles accordingly.
5. Rotation plan:
   - dual-key overlap if supported; steps to rotate with minimal downtime; rollback.
6. Auditability:
   - define what events are logged (auth failures, token refresh, key use where available).
7. STOP AND ASK THE USER if:
   - required operations are unknown,
   - secret injection method is unclear,
   - rotation cadence/owners are unspecified.


## OUTPUT FORMAT
Credential map template:

```text
CREDENTIAL MAP
- Integration: <name>
  - Env vars:
    - <VAR_NAME>: <purpose> (secret/non-secret)
  - Permissions/scopes: <list>
  - Used by: <service/workflow>
  - Storage: <secret manager/env var>
  - Rotation: <cadence> | <owner> | <procedure>
  - Audit: <what is logged and where>
```

If providing a template, output `assets/dotenv-template.example` with placeholders only.


## SAFETY & EDGE CASES
- Never output real secrets, tokens, or private keys. Use placeholders.
- Read-only by default; propose changes as a plan unless explicitly asked to modify files.
- Avoid over-broad scopes/roles unless justified by a documented requirement.


## EXAMPLES
- Input: “n8n HTTP nodes contain API keys.”  
  Output: Env var map + plan to move to n8n credentials/env vars + rotation runbook.

- Input: “Need dev vs prod separation.”  
  Output: Two env maps + naming scheme + access boundary checklist.

Related Skills

memory-hygiene

533
from sundial-org/awesome-openclaw-skills

Audit, clean, and optimize Clawdbot's vector memory (LanceDB). Use when memory is bloated with junk, token usage is high from irrelevant auto-recalls, or setting up memory maintenance automation.

portfolio-watcher

533
from sundial-org/awesome-openclaw-skills

Monitor stock/crypto holdings, get price alerts, track portfolio performance

portainer

533
from sundial-org/awesome-openclaw-skills

Control Docker containers and stacks via Portainer API. List containers, start/stop/restart, view logs, and redeploy stacks from git.

portable-tools

533
from sundial-org/awesome-openclaw-skills

Build cross-device tools without hardcoding paths or account names

polymarket

533
from sundial-org/awesome-openclaw-skills

Trade prediction markets on Polymarket. Analyze odds, place bets, track positions, automate alerts, and maximize returns from event outcomes. Covers sports, politics, entertainment, and more.

polymarket-traiding-bot

533
from sundial-org/awesome-openclaw-skills

No description provided.

polymarket-analysis

533
from sundial-org/awesome-openclaw-skills

Analyze Polymarket prediction markets for trading edges. Pair Cost arbitrage, whale tracking, sentiment analysis, momentum signals, user profile tracking. No execution.

polymarket-agent

533
from sundial-org/awesome-openclaw-skills

Autonomous prediction market agent - analyzes markets, researches news, and identifies trading opportunities

polymarket-5

533
from sundial-org/awesome-openclaw-skills

Query Polymarket prediction markets. Use for questions about prediction markets, betting odds, market prices, event probabilities, or when user asks about Polymarket data.

polymarket-4

533
from sundial-org/awesome-openclaw-skills

Query Polymarket prediction markets. Use for questions about prediction markets, betting odds, market prices, event probabilities, or when user asks about Polymarket data.

polymarket-3

533
from sundial-org/awesome-openclaw-skills

Query Polymarket prediction market odds and events via CLI. Search for markets, get current prices, list events by category. Supports sports betting (NFL, NBA, soccer/EPL, Champions League), politics, crypto, elections, geopolitics. Real money markets = more accurate than polls. No API key required. Use when asked about odds, probabilities, predictions, or "what are the chances of X".

polymarket-2

533
from sundial-org/awesome-openclaw-skills

Query Polymarket prediction markets - check odds, trending markets, search events, track prices.