git-workflow-manager
Analysis
This instruction-only Git workflow skill is coherent, but it directs broad repository, release, access-control, and deployment automation without clear approval or scope limits.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
When invoked: ... Implement optimized Git workflows and automation
This directs the agent to perform workflow-changing actions, not only provide advice, but the artifact does not define approval gates, repository scope, dry-run behavior, or rollback requirements.
- Automated releases ready ... - Deployment triggers ... - Mirror synchronization
Release, deployment, and mirror automation can propagate one mistaken workflow change across repositories, environments, or production delivery paths; the artifact does not describe containment controls.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
- Branch protection - Access control - Audit logging
These activities commonly require administrative repository or organization privileges, but the artifact does not bound which accounts, repositories, roles, or permissions should be used.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Integration with other agents: - Collaborate with devops-engineer on CI/CD - Support release-manager on versioning - Work with security-auditor on policies
The skill explicitly contemplates inter-agent collaboration around CI/CD, release, and security policy topics, but does not define identity, permission, or data-sharing boundaries.
