Trusted — Risk Score 5/100
Last scan:20 hr ago Rescan
5 /100
credential-vault
GPG AES-256 encrypted credential management tool for passwords, API tokens, and secrets
The skill is a legitimate GPG AES-256 credential manager with well-documented security practices, correctly declared permissions, and no malicious behavior detected.
Skill Namecredential-vault
Duration34.4s
Enginepi
Safe to install
No action required. The skill can be used safely. Consider pinning GPG versions in deployment environments for supply-chain hygiene.
ResourceDeclaredInferredStatusEvidence
Filesystem WRITE WRITE ✓ Aligned cred_manager.py:52 _gpg_encrypt subprocess, cred_manager.py:88 _secure_write_tem…
Shell WRITE WRITE ✓ Aligned cred_manager.py:44 subprocess.Popen for GPG encrypt/decrypt; cred_helper.sh:47 e…
Environment READ READ ✓ Aligned cred_manager.py:38 MASTER_PASS = os.environ.get('CRED_MASTER_PASS', '')
Network NONE NONE No network calls in any file
Clipboard NONE NONE No clipboard access
Browser NONE NONE No browser access
Database NONE NONE No database access
Skill Invoke NONE NONE No skill invocation
1 findings
🔗
Medium External URL 外部 URL
https://gpg4win.org
SKILL.md:28

File Tree

3 files · 22.8 KB · 602 lines
Python 1f · 357L Markdown 1f · 186L Shell 1f · 59L
├─ 📁 scripts
│ ├─ 🔧 cred_helper.sh Shell 59L · 2.1 KB
│ └─ 🐍 cred_manager.py Python 357L · 13.0 KB
└─ 📝 SKILL.md Markdown 186L · 7.7 KB

Dependencies 1 items

PackageVersionSourceKnown VulnsNotes
gnupg (gpg) any system binary No No version pinning available for system binaries; recommend verifying GPG installation in deployment

Security Positives

✓ Master password passed via --passphrase-fd stdin pipe, not command-line arguments — prevents ps aux leakage
✓ Temporary plaintext files created with mkstemp + fchmod 600 and securely zero-overwritten before unlink
✓ Encrypted credential file permissions set to 600 (owner-only)
✓ All known security limitations transparently documented in SKILL.md
✓ Environment variable access (CRED_MASTER_PASS) explicitly declared in _meta.json metadata
✓ GPG and python3 binary dependencies declared in metadata
✓ No credential exfiltration, no external network calls, no obfuscation
✓ Shell helper script uses identical --passphrase-fd 0 pattern as Python implementation
✓ No iteration over os.environ for credential harvesting — only reads the specific CRED_MASTER_PASS variable
✓ No access to sensitive paths (~/.ssh, ~/.aws, .env)