using-git-worktrees
Audited by Socket on Feb 16, 2026
1 alert found:
Obfuscated FileNo explicit signs of malware (no hard-coded C2 domains, exfiltration code, or obfuscated malicious payload). The workflow is legitimate for developer tooling but has moderate security risks: automatic .gitignore commits, automatic execution of package-manager install/build/test steps, lack of input sanitization for branch/location, and absence of sandboxing or integrity checks. Recommendations: require explicit user confirmation before modifying the repo or running installers/tests; validate and escape branch and path inputs; run installs/tests in a sandbox or container where possible; respect lockfiles/checksums; and provide an option to skip automatic installs/tests. With those mitigations the pattern is acceptable for developer productivity.