ghw is designed for environments where the account running automation is not fully trusted, but the installation prefix and the OS admin/root account are trusted.
- Use of
gh auth ...commands that may store/retrieve credentials implicitly. - Token leakage via shell-outs to
/usr/bin/security. - Accidental use of the wrong identity (requires
--as <alias>on every command).
- If admin/root is compromised,
ghwcannot protect secrets. ghwdoes not attempt to secureghitself; it constrains howghis invoked.
- Tokens live at rest in macOS Keychain.
ghwinjectsGH_TOKENinto theghsubprocess environment for a single invocation.ghwblocksgh auth ...and providesghw loginas the only way to store tokens.
--as <alias>selects a Keychain account entry.- There is intentionally no default identity.