git-cleanup-branches
Pass
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes standard command-line tools including
git,grep,awk, andxargs(or PowerShell equivalents) to identify and delete local branches. These operations are restricted to the local Git repository and are necessary for the skill's primary functionality. - [SAFE]: Analysis of the workflow shows no evidence of prompt injection, credential theft, or hidden obfuscation. The network activity is limited to standard
git fetchoperations which interact with the user's configured remote repository. - [PROMPT_INJECTION]: A minor indirect injection surface exists because the skill processes output from
git branch. While Git has strict naming conventions for branches, processing untrusted repository data with shell pipes could theoretically lead to command argument manipulation; however, this is a low-risk inherent property of Git automation tools.
Audit Metadata