storage-reclaim
Rapidly find and reclaim disk storage by identifying build artifacts, git garbage, temp files, and other space hogs. Use when disk is full or running low on space.
Best use case
storage-reclaim is best used when you need a repeatable AI agent workflow instead of a one-off prompt.
Rapidly find and reclaim disk storage by identifying build artifacts, git garbage, temp files, and other space hogs. Use when disk is full or running low on space.
Teams using storage-reclaim should expect a more consistent output, faster repeated execution, less prompt rewriting.
When to use this skill
- You want a reusable workflow that can be run more than once with consistent structure.
When not to use this skill
- You only need a quick one-off answer and do not need a reusable workflow.
- You cannot install or maintain the underlying files, dependencies, or repository context.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/storage-reclaim/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How storage-reclaim Compares
| Feature / Agent | storage-reclaim | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
Rapidly find and reclaim disk storage by identifying build artifacts, git garbage, temp files, and other space hogs. Use when disk is full or running low on space.
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
SKILL.md Source
# Storage Reclaim
Rapid parallel investigation and cleanup of disk storage.
## Quick Start
```bash
# Top-level overview
du -sh /path/*/ 2>/dev/null | sort -hr | head -20
# Drill into specific directory
du -sh /path/subdir/*/ 2>/dev/null | sort -hr | head -15
```
## Common Space Hogs
### 1. Rust Build Artifacts (`target/`)
- Location: Any Rust project root
- Size: 1-10+ GB per project
- Safe to delete: Yes (rebuilds on next `cargo build`)
```bash
# Find all Rust target directories
find ~ -type d -name "target" -exec du -sh {} \; 2>/dev/null | sort -hr | head -20
# Clean specific project
rm -rf /path/to/project/target
# Or use cargo
cd /path/to/project && cargo clean
```
### 2. Git Garbage (tmp_pack files)
- Location: `.git/objects/pack/tmp_pack_*`
- Cause: Interrupted git operations
- Size: Can be gigabytes
```bash
# Check for git garbage
git count-objects -vH
# Look for "size-garbage" line
# Remove stale pack files
rm -f .git/objects/pack/tmp_pack_*
# Verify cleanup
git count-objects -vH
```
### 3. Node Modules
- Location: `node_modules/` in JS projects
- Size: 100MB - 2GB per project
```bash
# Find all node_modules
find ~ -type d -name "node_modules" -prune -exec du -sh {} \; 2>/dev/null | sort -hr
# Remove (can reinstall with npm install)
rm -rf /path/to/project/node_modules
```
### 4. Python Virtual Environments
- Location: `.venv/`, `venv/`, `env/`
- Size: 100MB - 1GB per environment
```bash
find ~ -type d \( -name ".venv" -o -name "venv" -o -name "env" \) -exec du -sh {} \; 2>/dev/null | sort -hr
```
### 5. Hidden Temp Directories
- Location: `.tmp/`, `.cache/`, `__pycache__/`
- Often overlooked by `du` on directories
```bash
# Check hidden dirs specifically
du -sh /path/.* 2>/dev/null | sort -hr | head -10
```
### 6. Julia Artifacts
- Location: `~/.julia/artifacts/`, `~/.julia/compiled/`
- Size: Can grow to many GB
```bash
du -sh ~/.julia/*/ 2>/dev/null | sort -hr
```
### 7. Docker
```bash
docker system df
docker system prune -a # Remove all unused images/containers
```
### 8. Homebrew
```bash
brew cleanup --dry-run # Preview
brew cleanup # Actually clean
```
## Investigation Pattern
1. **Start broad**: `du -sh /path/*/ | sort -hr | head -20`
2. **Drill into largest**: Repeat for subdirectories
3. **Check hidden**: `du -sh /path/.* | sort -hr`
4. **Git check**: `git count-objects -vH` in any repo
5. **Clean safely**: Remove build artifacts first (always regeneratable)
## Safety Rules
- **Always safe to delete**: `target/`, `node_modules/`, `.tmp/`, `__pycache__/`, build/
- **Check first**: `.git/` (might have garbage, might be real history)
- **Never delete blindly**: Actual source code, `.git/objects/pack/*.pack` (real packs)
- **Regeneratable**: Anything that `cargo build`, `npm install`, `pip install` creates
## Parallel Investigation
Run multiple `du` commands simultaneously for faster discovery:
```bash
# In parallel (use separate terminal or background)
du -sh ~/project1/*/ | sort -hr &
du -sh ~/project2/*/ | sort -hr &
wait
```
## Scientific Skill Interleaving
This skill connects to the K-Dense-AI/claude-scientific-skills ecosystem:
### Graph Theory
- **networkx** [○] via bicomodule
- Universal graph hub
### Bibliography References
- `general`: 734 citations in bib.duckdb
## Cat# Integration
This skill maps to **Cat# = Comod(P)** as a bicomodule in the equipment structure:
```
Trit: 0 (ERGODIC)
Home: Prof
Poly Op: ⊗
Kan Role: Adj
Color: #26D826
```
### GF(3) Naturality
The skill participates in triads satisfying:
```
(-1) + (0) + (+1) ≡ 0 (mod 3)
```
This ensures compositional coherence in the Cat# equipment structure.Related Skills
secure-storage-template
Boilerplate code templates for Tizen KeyManager integration. Generates C/C#/.NET code for password-protected secure data storage.
performing-cloud-storage-forensic-acquisition
Perform forensic acquisition and analysis of cloud storage services including Google Drive, OneDrive, Dropbox, and Box by collecting both API-based remote data and local sync client artifacts from endpoint devices.
iecsat-storage
IECsat Storage Skill
exploiting-insecure-data-storage-in-mobile
Identifies and exploits insecure local data storage vulnerabilities in Android and iOS mobile applications including unencrypted databases, world-readable files, insecure SharedPreferences, plaintext credential storage, and improper keychain/keystore usage. Use when performing mobile penetration testing focused on OWASP M9 (Insecure Data Storage) or assessing compliance with MASVS-STORAGE requirements. Activates for requests involving mobile data storage security, local storage exploitation, SharedPreferences analysis, or mobile data leakage assessment.
detecting-misconfigured-azure-storage
Detecting misconfigured Azure Storage accounts including publicly accessible blob containers, missing encryption settings, overly permissive SAS tokens, disabled logging, and network access violations using Azure CLI, PowerShell, and Microsoft Defender for Storage.
detecting-azure-storage-account-misconfigurations
Audit Azure Blob and ADLS storage accounts for public access exposure, weak or long-lived SAS tokens, missing encryption at rest, disabled HTTPS-only traffic, and outdated TLS versions using the azure-mgmt-storage Python SDK.
configuring-hsm-for-key-storage
Hardware Security Modules (HSMs) are tamper-resistant physical devices that safeguard cryptographic keys and perform cryptographic operations in a hardened environment. Keys stored in an HSM never lea
analyzing-cloud-storage-access-patterns
Detect abnormal access patterns in AWS S3, GCS, and Azure Blob Storage by analyzing CloudTrail Data Events, GCS audit logs, and Azure Storage Analytics. Identifies after-hours bulk downloads, access from new IP addresses, unusual API calls (GetObject spikes), and potential data exfiltration using statistical baselines and time-series anomaly detection.
zx-calculus
Coecke's ZX-calculus for quantum circuit reasoning via string diagrams with Z-spiders (green) and X-spiders (red)
zulip-cogen
Zulip Cogen Skill 🐸⚡
zls-integration
zls-integration skill
zig
zig skill