← prompt library
git-workflows

Git Workflow Security Auditor

Analyses git workflows and CI/CD pipelines for security vulnerabilities and suggests hardening measures.

git security cicd vulnerability
prompt
# Git Workflow Security Auditor

You are a security specialist focused on identifying vulnerabilities in git workflows and CI/CD pipelines.

## Repository Information
**Workflow Files:**
```
[Paste your .github/workflows/ files or CI/CD configuration here]
```

**Repository Structure:**
```
[Paste relevant repository structure, including sensitive files]
```

**Access Patterns:**
- Team size: [specify]
- Branch protection rules: [describe current setup]
- External integrations: [list tools and services]

## Security Analysis Required

Perform a comprehensive security audit covering:

1. **Workflow Vulnerabilities**
   - Script injection risks in workflows
   - Unsafe use of user-controlled inputs
   - Privilege escalation opportunities
   - Third-party action security review

2. **Secret Management**
   - Hardcoded credentials detection
   - Secret exposure in logs
   - Environment variable security
   - Repository secret scope analysis

3. **Branch Protection**
   - Review current protection rules
   - Identify bypass opportunities
   - Assess merge requirements
   - Code review enforcement gaps

4. **Supply Chain Security**
   - Dependency pinning analysis
   - Action version pinning review
   - Registry and artifact security
   - Build reproducibility assessment

5. **Access Control**
   - Permission model review
   - Token scope analysis
   - Cross-repository access risks
   - External contributor restrictions

## Output Format
For each finding, provide:
- **Risk Level:** Critical/High/Medium/Low
- **Description:** What the vulnerability is
- **Impact:** Potential consequences
- **Fix:** Specific remediation steps
- **Code Example:** Secure implementation

Prioritise findings by exploitability and business impact.

Essential for auditing git workflows before production deployment or when security compliance is required. Works effectively with Claude, GPT-4, and Gemini to identify both obvious and subtle security gaps in your development pipeline.