github-cleanup
Pass
Audited by Gen Agent Trust Hub on Apr 24, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: Orchestrates the cleanup process using GitHub CLI to list, audit, and potentially delete repositories, secrets, and workflows. These operations are conducted within a strict multi-phase workflow that mandates user approval via the
AskUserQuestiontool before any destructive changes are executed.- [EXTERNAL_DOWNLOADS]: Fetches authoritative version information for GitHub Actions from a public repository on GitHub to assist in auditing workflow security. This operation targets a well-known service and is used solely for configuration comparison.- [DYNAMIC_EXECUTION]: Employs inline Python scripts to process and filter JSON data retrieved from GitHub APIs, specifically for triaging Dependabot alerts. This logic is used for data transformation and does not involve executing untrusted code.- [INDIRECT_PROMPT_INJECTION]: Ingests untrusted data including repository names, workflow file contents, and Dependabot alert lists from the GitHub API. The skill mitigates risks associated with processing this data by enforcing a mandatory human-in-the-loop approval phase (Phase 6) before any destructive capabilities, such as repository or secret deletion, are invoked. Structural validation of the ingested data is performed usingjqand Python's JSON parser.
Audit Metadata