00-critical HARD STOP Rules
GIT — Destructive Commands BANNED
This file exists because AI agents sometimes skip detailed rules. These are non-negotiable. Violating any of these = immediate session failure.
GIT — Destructive Commands BANNED
git reset --hard— BANNED (especially with uncommitted changes)git checkout -f/git checkout -- .— BANNEDgit clean -fd— BANNEDgit rebase— BANNEDgit push --force/git push -f— BANNEDgit push origin branchA:branchB(cross-push) — BANNEDgit stash drop/git stash clear— BANNED
GIT — Before Any Destructive Action
git status— uncommitted changes exist? STOP. Ask the user.git stash pushwas used? → Rungit stash show --stat stash@{0}to verify contents.- Never assume stash succeeded without verification.
GIT — Protected Branches
- Never commit directly to
main,master, ordevelop - Always work on
feature/*branches - PR merge only — no direct push to protected branches
DATA — User Work Protection
- User's uncommitted changes are irreversible (R2) — treat as sacred
- Dirty working tree = GUARD MODE — no destructive git commands without explicit user approval
- When in doubt: ask, don't destroy
SECURITY
- No hardcoded secrets (API keys, passwords, tokens)
- No
.envfile modifications - No PII in logs