git-worktree
Fail
Audited by Gen Agent Trust Hub on Feb 26, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The
wt.shscript executes shell commands retrieved from project-level configuration files. Evidence: The script usesevalto run thesetupandarchivescripts defined inconductor.jsonlocated within the target repository. - [REMOTE_CODE_EXECUTION]: This mechanism allows an untrusted repository to achieve remote code execution on the user's machine if the agent processes the repository using this skill. Mandatory Evidence Chain: 1. Ingestion points:
conductor.jsonand.context/handoff.mdin the target repository; 2. Boundary markers: None; 3. Capability inventory: Shell execution viaevaland UI automation viaosascript; 4. Sanitization: None performed on the scripts extracted from the JSON file. - [COMMAND_EXECUTION]: The skill uses macOS
osascriptto perform keystroke injection into terminal applications. Evidence: Theopen_terminal_tabfunction inscripts/wt.shautomates terminals by sending commands viakeystroke, which can be influenced by project files or command-line arguments. - [DATA_EXFILTRATION]: The skill automatically copies sensitive environment files between repo directories. Evidence: The
copy_env_filesfunction inscripts/wt.shhandles.env,.env.local, and.dev.varsfiles, exposing potentially sensitive credentials.
Recommendations
- AI detected serious security threats
Audit Metadata