I did not find committed live credentials, private keys, or obvious sensitive tokens in the tracked repository contents.
The main residual risks are:
- A tracked Claude settings file exposes a local absolute filesystem path and username.
- Ignored local SQLite databases exist in the working copy and contain runtime data, including hashed API-key material and event/session records. They are not tracked by git today, but they would be sensitive if someone force-added them or shared the repository directory as an archive.
Impact: Minor privacy leak. The repository exposes a developer-local absolute path that includes the local username.
- Evidence: .claude/settings.json
- Detail: The hook command embeds
/home/nistrator/Documents/github/amplifier/ai_working/agent_debugger/..., which reveals the local usernamenistratorand local directory layout. - Recommendation: Replace the hardcoded absolute path with a repo-relative or environment-derived path.
- Evidence reviewed:
- Notes:
.env.examplecontains placeholders such assk-..., not live values.- Test files use clearly synthetic sample keys like
ad_live_test123andad_live_test. - Targeted git-history searches for common secret formats did not return committed AWS keys, GitHub tokens, Slack tokens, Google API keys, JWTs, or private-key blocks.
- Evidence:
- Notes:
- Local ignored files currently present include
.coverage,traces/,dist/, and SQLite databases underdata/. - The local
data/agent_debugger.dbcontains tables such asapi_keys,events,sessions, andcheckpoints. - The
api_keystable appears to store hashed key material, not raw keys, and sampled pattern checks did not show obvious raw bearer tokens, OpenAI-style keys, passwords, or emails in the checked database fields.
- Local ignored files currently present include
- Searched tracked files for secret-related keywords and high-signal credential formats.
- Checked for tracked
.env, key, certificate, and keystore-style files. - Ran targeted git-history searches for common credential patterns.
- Reviewed ignore rules to confirm local runtime artifacts are excluded from git.
- Inspected local SQLite schemas and pattern counts without dumping record contents.
- No dedicated entropy-based secret scanner such as
gitleaksordetect-secretswas installed in this environment. - The history review was targeted to high-signal credential patterns rather than a full scanner-backed audit of every commit blob.