What file-deletion Does
File-deletion is a security-focused skill that provides methods for permanently removing files and sensitive data from storage systems. Unlike standard file deletion operations that simply mark files as deleted (leaving data recoverable), this skill implements secure data sanitization techniques that overwrite file contents multiple times before removal, making recovery virtually impossible. This is essential for organizations handling confidential information, compliance-regulated data, or anyone concerned about data privacy.
How to Install
- Clone or download the skill from the GitHub repository
- Navigate to the
computer-forensics-skills/skills/file-deletiondirectory - Review the skill’s documentation and dependencies (typically requires Python 3.7+)
- Install any required packages using
pip install -r requirements.txt - Integrate the skill into your Claude workflow by importing the deletion modules
- Test with non-critical files first to verify proper functionality
- Configure sanitization parameters based on your security requirements (number of overwrite passes, algorithm selection)
Use Cases
- GDPR/HIPAA Compliance: Permanently delete personally identifiable information (PII) and health records to meet regulatory data retention requirements
- Corporate Data Destruction: Securely remove sensitive business documents, financial records, and proprietary information before device decommissioning
- Personal Privacy: Eliminate browsing history, cached files, and temporary data that could reveal user behavior or preferences
- Incident Response: Rapidly sanitize compromised systems after security breaches to prevent leaked data recovery
- Cloud Storage Cleanup: Securely delete development test data, API credentials, and staging environment files from shared storage systems
How It Works
The file-deletion skill operates by implementing multi-pass overwrite algorithms that replace file data with random or predetermined patterns before physical deletion. When a file is marked for deletion, instead of simply removing the file system pointer, the skill performs sequential write operations across the entire file’s data blocks. Each pass overwrites the space with different patterns (commonly random data or standardized patterns like zeros or ones), making it exponentially harder to recover original content through forensic analysis.
The skill supports various deletion standards including NIST guidelines (which recommend 1 pass), DoD 5220.22-M (which uses 7 passes with specific patterns), and Gutmann method (35 passes for older magnetic media). Modern implementations often default to 3-5 passes as a balance between security and performance, since modern storage devices make recovery increasingly difficult regardless of pass count. The skill also handles file metadata sanitization, clearing file names, timestamps, and other attributes that could reveal sensitive information about deleted content.
Pros and Cons
Pros:
- Meets regulatory compliance requirements (GDPR, HIPAA, SOX)
- Multiple sanitization standards available for different security needs
- Makes forensic data recovery virtually impossible
- Automatable for batch operations and scheduled cleanup
- Works across different file systems and storage types
- Provides audit trails for compliance documentation
Cons:
- Significant performance impact, especially with high pass counts or large files
- Less effective on SSDs due to wear-leveling (though Secure Erase helps)
- No recovery possible after execution—requires careful file verification beforehand
- Cloud storage implementation depends on provider policies and may not guarantee compliance
- Physical destruction remains only absolute guarantee for highly classified data
- Can wear out storage devices faster if used excessively due to repeated writes
Related Skills
- disk-encryption: Encrypt files before deletion to add an extra security layer
- access-control: Restrict file access permissions to prevent unauthorized deletion
- audit-logging: Track who deleted what and when for compliance documentation
- data-backup: Create secure backups before running deletion operations
- forensic-analysis: Analyze files before deletion to ensure proper identification
Alternatives
- Built-in OS tools: Windows Cipher /W, macOS Secure Empty Trash, Linux shred command (though less effective)
- Third-party software: BleachBit, Eraser, CCleaner’s deletion features (offer GUI interfaces but less enterprise control)
- Hardware-based solutions: Full disk encryption with key destruction, or physical device destruction for maximum security