From shipshitdev-library
Scans git history for sensitive files like .env and keys, cleans leaks using git-filter-repo or BFG, and sets up .gitignore plus pre-commit hooks to prevent future leaks. Useful for secret scans, repo cleanup, or securing git repos.
npx claudepluginhub shipshitdev/skillsThis skill uses the workspace's default tool permissions.
Comprehensive security scanning, cleaning, and prevention for git repositories.
Provides UI/UX resources: 50+ styles, color palettes, font pairings, guidelines, charts for web/mobile across React, Next.js, Vue, Svelte, Tailwind, React Native, Flutter. Aids planning, building, reviewing interfaces.
Fetches up-to-date documentation from Context7 for libraries and frameworks like React, Next.js, Prisma. Use for setup questions, API references, and code examples.
Analyzes competition with Porter's Five Forces, Blue Ocean Strategy, and positioning maps to identify differentiation opportunities and market positioning for startups and pitches.
Comprehensive security scanning, cleaning, and prevention for git repositories.
Removing secrets from git history does NOT make them safe!
Even after cleaning git history:
ALWAYS rotate leaked credentials immediately. Cleaning history is NOT enough.
/git-safety scan - Detect Sensitive FilesScan repository for sensitive files in current state and git history.
/git-safety clean - Remove from HistoryRemove sensitive files using git-filter-repo or BFG.
/git-safety prevent - Set Up PreventionConfigure .gitignore and pre-commit hooks.
/git-safety full - Complete AuditRun all three operations in sequence.
.env, .env.*, credentials.json, service-account*.json
*.pem, *.key, id_rsa*, secrets.*, .npmrc, *.secret
Scan for sensitive files in history:
git log --all --pretty=format: --name-only --diff-filter=A | sort -u | grep -iE 'env|secret|credential|key'
Remove .env from all history:
git filter-repo --path .env --invert-paths --force
git push origin --force --all
Add to .gitignore:
echo -e "\n.env\n.env.*\n*.pem\n*.key\ncredentials.json" >> .gitignore
If you've leaked credentials:
/git-safety cleanFor complete scan commands, cleaning process with git-filter-repo/BFG, pre-commit hook setup, .gitignore templates, platform-specific guidance, and detailed emergency checklist, see: references/full-guide.md