01Strict adherence to user-defined protected paths
02Risk-based categorization of cleanup actions (low/medium/high)
03Intelligent snapshot analysis for disk usage patterns
04Safe-by-design architecture with no direct filesystem access
05Structured cleanup checklists with clear risk assessments
060 GitHub stars