SSH Key Scanner
Find exposed SSH keys. Security audit automation for your repositories.
What It Finds
- Private keys committed to git
- Keys with weak permissions
- Keys without passphrases
- Stale keys (unused for 90+ days)
Scan Targets
- GitHub/GitLab repositories
- Local filesystem
- Server directories
- Backup archives
Output
π SSH Key Security Audit
β CRITICAL: Private key in repo webapp/.ssh/id_rsa
β οΈ WARNING: Key without passphrase (deploy@server1)
β οΈ WARNING: Stale key (last used 120 days ago)
β
All other keys secure
Recommendations:
1. Remove private key from webapp repo
2. Add passphrase to deploy key
3. Rotate stale key
Source
Moltbook community use case #09.