Who Is Actor — Git Repository Developer Profiling Skill

🔗 Project Repository: https://github.com/wscats/who-is-actor

Zero install dependencies, zero scripts. Collects data purely through native git commands and standard Unix text utilities (cut, sort, awk, grep, etc. — already present on most systems), interpreted by AI, to generate a serious, direct, and unsparing report card for every developer.

"Zero dependency" clarification: This skill installs nothing — no pip packages, no npm modules, no custom scripts. However, it does require the following standard system binaries to be available on the host: git, cut, sort, uniq, awk, grep, sed, wc, head. These are pre-installed on virtually all Unix-like systems (macOS, Linux). On Windows, use Git Bash or WSL.


You don't need to memorize any commands or parameters — simply describe what you need in any language:

English

💬 "Analyze the repository at /path/to/my-project"
💬 "Profile all developers in this repo"
💬 "Who are the most active contributors in /path/to/my-project?"
💬 "Compare commit habits of Alice and Bob"
💬 "Show me the code quality report for this project since 2024-01-01"
💬 "What does each developer's work pattern look like on branch main?"
💬 "Give me an honest review of every contributor's strengths and weaknesses"
💬 "Is there a bus-factor risk in /path/to/my-project?"

中文

💬 "分析一下 /path/to/my-project 这个仓库"
💬 "帮我看看这个项目里每个开发者的提交习惯"
💬 "对比一下 Alice 和 Bob 的研发效率"
💬 "生成这个仓库的开发者画像报告"
💬 "这个项目的代码质量怎么样?"
💬 "从 2024 年 1 月开始,分析 main 分支的提交记录"
💬 "团队里谁的代码风格最好?谁需要改进?"
💬 "看看这个仓库有没有巴士因子风险"

日本語

💬 "このリポジトリの開発者を分析してください /path/to/my-project"
💬 "各開発者のコミット習慣を比較してください"
💬 "このプロジェクトのコード品質レポートを作成してください"
💬 "チームの開発効率を評価してください"

한국어

💬 "이 저장소의 개발자 프로필을 분석해 주세요 /path/to/my-project"
💬 "각 개발자의 커밋 습관을 비교해 주세요"
💬 "이 프로젝트의 코드 품질 보고서를 만들어 주세요"
💬 "팀의 개발 효율성을 평가해 주세요"

Español

💬 "Analiza el repositorio en /path/to/my-project"
💬 "Compara los hábitos de commit de todos los desarrolladores"
💬 "Dame un informe de calidad del código de este proyecto"
💬 "¿Quién es el desarrollador más activo del equipo?"

Français

💬 "Analyse le dépôt situé à /path/to/my-project"
💬 "Compare les habitudes de commit de chaque développeur"
💬 "Génère un rapport de qualité du code pour ce projet"
💬 "Qui est le contributeur le plus actif de l'équipe ?"

Deutsch

💬 "Analysiere das Repository unter /path/to/my-project"
💬 "Vergleiche die Commit-Gewohnheiten aller Entwickler"
💬 "Erstelle einen Code-Qualitätsbericht für dieses Projekt"
💬 "Wer ist der aktivste Entwickler im Team?"

⚙️ Parameters

Parameter Description Required Default
repo_path Absolute path to the target Git repository ✅ Yes
authors Comma-separated display names (emails NOT accepted) No All contributors
since Start date in ISO format (YYYY-MM-DD) No Full history
until End date in ISO format (YYYY-MM-DD) No Full history
branch Target branch to analyze No Active branch

What you get: A structured Markdown report with a summary table, per-developer profiles (six-dimension radar scores, strengths/weaknesses, improvement suggestions), team comparison, and bus-factor risk alerts.


Security Specification

All shell command parameters MUST be strictly validated before execution to prevent command injection attacks.

Before executing any commands, the agent SHOULD offer a dry-run mode that:

  1. Collects and validates all parameters per the rules below
  2. Constructs the full list of shell commands that would be executed
  3. Prints every command to the user for review WITHOUT executing any of them
  4. Waits for explicit user approval before proceeding to actual execution

To trigger dry-run mode, the user can say:

💬 "Show me the commands first before running them"
💬 "Do a dry run on /path/to/repo"
💬 "先列出要执行的命令,不要运行"

This allows the user to verify that every command strictly matches the whitelist below.

Command Whitelist (Only These Commands Are Allowed)

This skill only permits the following predefined read-only git subcommands. No other shell commands may be executed:

Allowed Command Purpose Modifies Repo?
git -C <path> rev-parse --is-inside-work-tree Verify the path is a valid Git repository ❌ Read-only
git -C <path> shortlog -sn --all Get contributor list and commit counts ❌ Read-only
git -C <path> log ... Get commit history details ❌ Read-only
git -C <path> diff --stat ... Get change statistics ❌ Read-only

Strictly Prohibited Command Types:

If the AI agent attempts to execute a command outside the whitelist, the user should immediately reject execution.

Input Validation Rules (Must Be Completed Before Any Git Command)

  1. repo_path (Repository Path) Validation:
    • Must be an absolute path (starting with /)
    • Must NOT contain any of these dangerous characters or substrings: ;, |, &, $, `, (, ), >, <, \n, \r, $(), ..
    • Path must be a real, existing Git repository (verified via git -C <path> rev-parse --is-inside-work-tree returning true)
    • If validation fails, immediately abort and report the error to the user — no subsequent commands may be executed
  2. author (Author Name) Validation:
    • Only allowed characters: letters (a-z A-Z), digits (0-9), spaces, hyphens (-), underscores (_), dots (.)
    • The @ symbol is NOT allowed (email format is prohibited to align with privacy protection rules)
    • Regex whitelist: ^[a-zA-Z0-9 _.-]+$
    • Maximum length: 128 characters
    • If input contains @, prompt the user to use the author's display name instead, then skip that author
  3. since / until (Date Parameters) Validation:
    • Must match ISO date format: ^[0-9]{4}-[0-9]{2}-[0-9]{2}$
    • If validation fails, ignore the parameter and warn the user
  4. branch (Branch Name) Validation:
    • Only allowed characters: letters, digits, /, -, _, .
    • Regex whitelist: ^[a-zA-Z0-9/_.-]+$
    • Must NOT contain the .. substring
    • If validation fails, use the default branch and warn the user

Privacy Protection Rules

Sensitive Data Filtering Rules (Mandatory)

Before sending any data to the AI model for analysis, the agent MUST apply the following filtering:

  1. Commit messages are processed locally for statistics only:
    • The agent collects commit message lengths (character counts) and keyword matches (e.g., fix, feat, revert) locally via shell commands.
    • Full commit message text MUST NOT be forwarded verbatim to the AI model. Instead, send only aggregated metrics (average length, keyword counts, conventional commit compliance rate).
    • If the user explicitly requests to see specific commit messages, the agent MUST:
      1. First apply all redaction patterns listed below
      2. Truncate each message to a maximum of 120 characters
      3. Display redacted messages only in the final user-facing report, never in intermediate AI prompts
      4. Warn the user that commit messages may contain sensitive information
  2. Automatic redaction of secret patterns: Before any text (commit messages, filenames, branch names) is included in the AI prompt, the agent MUST scan for and redact the following patterns:
    • API keys / tokens: strings matching (?i)(api[_-]?key|token|secret|password|credential|auth)[=:]\s*\S+
    • AWS keys: AKIA[0-9A-Z]{16}
    • Private keys: -----BEGIN .* PRIVATE KEY-----
    • Connection strings: (?i)(mysql|postgres|mongodb|redis)://\S+
    • Generic secrets: any string longer than 20 characters containing only alphanumeric characters that appears after = or : in a key-value pattern
    • Replace matched content with [REDACTED]
  3. Filename filtering:
    • Filenames are collected only to determine file extensions for language/type statistics.
    • Full file paths SHOULD NOT be sent to the AI model unless the user explicitly requests file-level analysis.
    • If full paths are sent, redact any path components that match common secret file patterns: .env, .credentials, *secret*, *password*, *token*.

Repository Path Scope Rules

Enforcement Verification Protocol

Because this is an instruction-only skill (no executable code), safety guarantees depend on the AI agent correctly implementing the rules above. Users SHOULD verify enforcement before trusting the skill on sensitive repositories.

Verification steps (run on a safe test repository first):

  1. Dry-run test: Ask the agent to analyze a test repo using dry-run mode. Verify that:
    • Every proposed command appears in the Command Whitelist table above
    • No commands use %ae (email format) or -sne flags
    • All user-supplied values (path, author, dates) are properly quoted
  2. Input validation test: Deliberately provide invalid inputs and verify rejection:
    "Analyze /tmp/test; rm -rf /"          -> agent MUST reject (dangerous characters)
    "Profile author user@email.com"         -> agent MUST reject (@ not allowed)
    "Analyze since 2024-13-99"              -> agent MUST reject or warn (invalid date)
    "Analyze branch ../../etc/passwd"       -> agent MUST reject (.. not allowed)
    
  3. Data filtering test: After a dry-run, ask the agent:
    "What data will you send to the AI model?"
    

    The agent should confirm it sends only aggregated metrics (counts, averages, percentages), NOT raw commit messages or full file paths.

  4. Redaction test: If commit messages are requested, verify that:
    • Messages are truncated to <=120 characters
    • Patterns like API_KEY=xxx appear as [REDACTED]
    • Messages appear only in the final report, not in intermediate processing

If any verification step fails, do NOT use the skill on sensitive repositories. Report the failure to the skill maintainer.

Use Cases

Core Principles

Install nothing, run no scripts. All data collection is done exclusively through native git commands (git log, git shortlog, git diff --stat, etc.). The AI is responsible for interpretation and evaluation.

Security first. All user inputs must pass the validation rules above before being incorporated into shell commands. Any validation failure must result in termination or graceful degradation — never skip validation.

Workflow

Step 1: Confirm Analysis Parameters

Confirm the following with the user (use defaults if not specified):

Parameter Description Default
Repository Path Absolute path to the target Git repository (Required)
Target Authors Specific developers to analyze; leave blank for all All contributors
Date Range Start/end dates in ISO format Full repository history
Branch Target branch for analysis Current active branch

⚠️ Before executing Step 2, ALL parameters MUST be validated according to the "Security Specification" above. Parameters that fail validation MUST NOT be used in command construction.

Step 2: Data Collection (Pure Git Commands)

Execute the following git commands in sequence to collect raw data. All commands run against the target repository directory — no dependencies need to be installed.

In the examples below, <repo_path>, <author>, etc. are placeholders for validated safe values from Step 1.

2.1 Contributor Overview

# List all contributors with commit counts (no email to protect privacy)
git -C <repo_path> shortlog -sn --all

2.2 Per-Author Commit Details

For each author to be analyzed, execute the following commands (append --since, --until, <branch> parameters if a date range or branch was specified):

# Detailed commit log: hash, author name, date, message, file stats (no email)
git -C <repo_path> log --author="<author>" --pretty=format:"%H|%an|%aI|%s" --numstat

# Commit count per hour of day (for work habit analysis)
git -C <repo_path> log --author="<author>" --pretty=format:"%aI" | cut -c12-13 | sort | uniq -c | sort -rn

# Commit count per day of week (1=Mon, 7=Sun)
git -C <repo_path> log --author="<author>" --pretty=format:"%ad" --date=format:"%u" | sort | uniq -c | sort -rn

# Lines added/deleted summary
git -C <repo_path> log --author="<author>" --pretty=tformat: --numstat | awk '{ add += $1; subs += $2 } END { printf "added: %s, deleted: %s\n", add, subs }'

# Commit message lengths
git -C <repo_path> log --author="<author>" --pretty=format:"%s" | awk '{ print length }'

# File types touched
git -C <repo_path> log --author="<author>" --pretty=tformat: --name-only | grep -oE '\.[^./]+$' | sort | uniq -c | sort -rn | head -20

# Commits per day (for frequency analysis)
git -C <repo_path> log --author="<author>" --pretty=format:"%ad" --date=short | sort | uniq -c | sort -rn | head -20

# Recent rework detection: files modified multiple times within 7-day windows
git -C <repo_path> log --author="<author>" --pretty=format:"%ad %s" --date=short --name-only | head -200

2.3 Code Quality Signals

# Bug fix commits (messages containing fix/bug/hotfix/patch)
git -C <repo_path> log --author="<author>" --grep="fix\|bug\|hotfix\|patch" --oneline -i | wc -l

# Revert commits
git -C <repo_path> log --author="<author>" --grep="revert" --oneline -i | wc -l

# Large commits (>500 lines changed)
git -C <repo_path> log --author="<author>" --pretty=format:"%H" --shortstat | grep -E "([5-9][0-9]{2}|[0-9]{4,}) insertion" | wc -l

# Merge commits
git -C <repo_path> log --author="<author>" --merges --oneline | wc -l

# Conventional commit check (feat/fix/chore/docs/style/refactor/test/perf/ci/build)
git -C <repo_path> log --author="<author>" --pretty=format:"%s" | grep -cE "^(feat|fix|chore|docs|style|refactor|test|perf|ci|build)(\(.+\))?:"

2.4 Team-Level Data

# Files with only one contributor (bus factor risk)
git -C <repo_path> log --pretty=format:"%an" --name-only | sort | uniq -c | sort -rn | head -30

# Active date range per author
git -C <repo_path> log --author="<author>" --pretty=format:"%ad" --date=short | sort | sed -n '1p;$p'

Step 3: AI Analysis & Evaluation

Based on the collected raw data, analyze each developer across the following six dimensions, assigning a score of 1–10 for each:


📝 Dimension 1: Commit Habits

Analysis Factors:

Scoring Criteria:


⏰ Dimension 2: Work Habits

Analysis Factors:

Scoring Criteria:

Note: Late-night/weekend coding is not inherently "bad," but persistent patterns may indicate process or resource issues.


🚀 Dimension 3: Development Efficiency

Analysis Factors:

Scoring Criteria:


🎨 Dimension 4: Code Style

Analysis Factors:

Scoring Criteria:


🔍 Dimension 5: Code Quality

Analysis Factors:

Scoring Criteria:


📊 Dimension 6: Engagement Index

⚠️ Usage Restriction: This index is intended solely as a macro-level reference for team collaboration patterns. It is strictly prohibited to use it as a basis for individual performance reviews, layoff decisions, compensation adjustments, or any other HR decisions. Users should understand the limitations of this index and bear corresponding ethical responsibility.

Note: This index aims to objectively measure visible participation levels in the code repository as a supplementary reference. Git records only reflect code commit activity and do not represent a developer's full body of work (design, code review, communication, mentoring, etc. are not captured by Git).

Calculation Method (composite of the following signals, 0–100 scale, lower = higher visible engagement):

Signal Weight Description
Very low daily commits (<0.3) 25% Output during active days is too low
Low active-day ratio (<30%) 20% Large time span but few actual working days
Very low or negative net code growth 20% More code deleted than written
Careless commit messages (avg <15 chars) 15% Not taking commit records seriously
High churn rate + high rework rate 20% Large amount of wasted effort

Levels:

Important: This index is calculated solely from Git commit records and cannot reflect code reviews, architecture design, technical discussions, team mentoring, or other work that doesn't produce commits. A high score does NOT equal "slacking," and a low score does NOT equal "efficient." Please make judgments only after understanding the full context.

Step 4: Generate Report

The final report MUST include the following structure:

4.1 Summary Table

Developer Commits Lines +/- Daily Avg Weekend% Late-Night% Bug Fix% Churn Rate Engagement Overall Score

4.2 Individual Developer Profiles

For each developer, output:

  1. Data Dashboard: Key metrics for all six dimensions
  2. AI Commentary: Serious, direct assessment of strengths and weaknesses (no sugarcoating)
  3. Improvement Suggestions: Specific, actionable recommendations for each weakness
  4. Six-Dimension Radar Score: 1–10 per dimension
  5. Overall Score: Weighted average (Commit Habits 15%, Work Habits 15%, Dev Efficiency 25%, Code Style 15%, Code Quality 20%, Engagement Index inverse 10%)
  6. One-Line Summary: A sharp, memorable sentence summarizing this developer

4.3 Team Cross-Comparison

Commentary Style Requirements

Important Notes

Ethical Use Policy

Reports generated by this skill should adhere to the following principles:

  1. Supplementary reference, NOT a decision-making basis: Reports are for internal team reference only, to help understand collaboration patterns and areas for improvement. They are strictly prohibited from being used directly for performance reviews, layoff decisions, compensation adjustments, or other HR decisions.
  2. Transparency: If using this tool within a team, it is recommended to inform all analyzed team members in advance.
  3. Full context: Any citation of the report should include complete limitation disclaimers to avoid being taken out of context.
  4. Critique the work, not the person: The goal is to improve team collaboration processes and individual work methods, not to judge a person's worth.