expanso-log-sanitize
\
Setup & Installation
Install command
clawhub install aronchick/expanso-log-sanitizeIf the CLI is not installed:
Install command
npx clawhub@latest install aronchick/expanso-log-sanitizeOr install with OpenClaw CLI:
Install command
openclaw skills install aronchick/expanso-log-sanitizeor paste the repo link into your assistant's chat
Install command
https://github.com/openclaw/skills/tree/main/skills/aronchick/expanso-log-sanitizeWhat This Skill Does
Sanitizes log entries by detecting and removing passwords, tokens, and other sensitive patterns from log streams. Runs as a CLI pipeline for one-off use or as an MCP server for continuous processing.
Running inline in a pipeline means logs are sanitized at the source rather than relying on manual grep/sed scripts that require ongoing pattern maintenance.
When to Use It
- Scrubbing API keys from app logs before sharing with a support team
- Removing passwords from CI/CD pipeline output before archiving
- Stripping auth tokens from debug logs before committing to a repo
- Cleaning log files before ingesting into a centralized logging service
- Redacting credentials from logs shared with third-party monitoring tools
View original SKILL.md file
# log-sanitize "Sanitize log entries by removing passwords, tokens, and sensitive patterns" ## Requirements - Expanso Edge installed (`expanso-edge` binary in PATH) - Install via: `clawhub install expanso-edge` ## Usage ### CLI Pipeline ```bash # Run standalone echo '<input>' | expanso-edge run pipeline-cli.yaml ``` ### MCP Pipeline ```bash # Start as MCP server expanso-edge run pipeline-mcp.yaml ``` ### Deploy to Expanso Cloud ```bash expanso-cli job deploy https://skills.expanso.io/log-sanitize/pipeline-cli.yaml ``` ## Files | File | Purpose | |------|---------| | `skill.yaml` | Skill metadata (inputs, outputs, credentials) | | `pipeline-cli.yaml` | Standalone CLI pipeline | | `pipeline-mcp.yaml` | MCP server pipeline |
Example Workflow
Here's how your AI assistant might use this skill in practice.
User asks: Scrubbing API keys from app logs before sharing with a support team
- 1Scrubbing API keys from app logs before sharing with a support team
- 2Removing passwords from CI/CD pipeline output before archiving
- 3Stripping auth tokens from debug logs before committing to a repo
- 4Cleaning log files before ingesting into a centralized logging service
- 5Redacting credentials from logs shared with third-party monitoring tools
\
Security Audits
These signals reflect official OpenClaw status values. A Suspicious status means the skill should be used with extra caution.