Scan Report
5 /100
credential-vault
GPG AES-256 encrypted credential management tool for passwords, API tokens, and secrets
The skill is a legitimate GPG AES-256 credential manager with well-documented security practices, correctly declared permissions, and no malicious behavior detected.
Safe to install
No action required. The skill can be used safely. Consider pinning GPG versions in deployment environments for supply-chain hygiene.
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | WRITE | WRITE | ✓ Aligned | cred_manager.py:52 _gpg_encrypt subprocess, cred_manager.py:88 _secure_write_tem… |
| Shell | WRITE | WRITE | ✓ Aligned | cred_manager.py:44 subprocess.Popen for GPG encrypt/decrypt; cred_helper.sh:47 e… |
| Environment | READ | READ | ✓ Aligned | cred_manager.py:38 MASTER_PASS = os.environ.get('CRED_MASTER_PASS', '') |
| Network | NONE | NONE | — | No network calls in any file |
| Clipboard | NONE | NONE | — | No clipboard access |
| Browser | NONE | NONE | — | No browser access |
| Database | NONE | NONE | — | No database access |
| Skill Invoke | NONE | NONE | — | No skill invocation |
1 findings
Medium External URL 外部 URL
https://gpg4win.org SKILL.md:28 File Tree
3 files · 22.8 KB · 602 lines Python 1f · 357L
Markdown 1f · 186L
Shell 1f · 59L
├─
▾
scripts
│ ├─
cred_helper.sh
Shell
│ └─
cred_manager.py
Python
└─
SKILL.md
Markdown
Dependencies 1 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
gnupg (gpg) | any | system binary | No | No version pinning available for system binaries; recommend verifying GPG installation in deployment |
Security Positives
✓ Master password passed via --passphrase-fd stdin pipe, not command-line arguments — prevents ps aux leakage
✓ Temporary plaintext files created with mkstemp + fchmod 600 and securely zero-overwritten before unlink
✓ Encrypted credential file permissions set to 600 (owner-only)
✓ All known security limitations transparently documented in SKILL.md
✓ Environment variable access (CRED_MASTER_PASS) explicitly declared in _meta.json metadata
✓ GPG and python3 binary dependencies declared in metadata
✓ No credential exfiltration, no external network calls, no obfuscation
✓ Shell helper script uses identical --passphrase-fd 0 pattern as Python implementation
✓ No iteration over os.environ for credential harvesting — only reads the specific CRED_MASTER_PASS variable
✓ No access to sensitive paths (~/.ssh, ~/.aws, .env)