Artifact Redactor
by @zack-dev-cm
Public OpenClaw skill for redacting private paths, secret-like strings, private URLs, and common PII from Markdown, JSON, logs, and other text artifacts befo...
1. Scan the source artifacts.
- Use python3 {baseDir}/scripts/scan_sensitive_text.py --root .
- Point --root at either one file or a directory.
2. Write a redacted copy.
- Use python3 {baseDir}/scripts/redact_artifacts.py --root .
- This writes only supported text files into the output tree.
- Binary or unsupported files are skipped and called out for manual review.
3. Check the output.
- Use python3 {baseDir}/scripts/check_redaction_output.py --root .
- The check returns share-ready only when no supported-text findings remain and no skipped files still require manual review.
- If skipped files exist, expect manual-review-required rather than a full-clear result.
4. Render the report.
- Use python3 {baseDir}/scripts/render_redaction_report.py --scan .
- Share the report with the redacted output directory instead of the raw artifacts.
clawhub install artifact-redactor