git-cleanup-branches

Pass

Audited by Gen Agent Trust Hub on Mar 1, 2026

Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill utilizes standard command-line tools including git, grep, awk, and xargs (or PowerShell equivalents) to identify and delete local branches. These operations are restricted to the local Git repository and are necessary for the skill's primary functionality.
  • [SAFE]: Analysis of the workflow shows no evidence of prompt injection, credential theft, or hidden obfuscation. The network activity is limited to standard git fetch operations which interact with the user's configured remote repository.
  • [PROMPT_INJECTION]: A minor indirect injection surface exists because the skill processes output from git branch. While Git has strict naming conventions for branches, processing untrusted repository data with shell pipes could theoretically lead to command argument manipulation; however, this is a low-risk inherent property of Git automation tools.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 1, 2026, 10:12 AM