using-git-worktrees
Audited by Socket on Feb 27, 2026
1 alert found:
SecurityThe using-git-worktrees skill matches its intended purpose and implements a reasonable workflow for creating isolated worktrees and setting up projects. It is not obviously malicious, but it contains several moderate-to-high supply-chain and autonomy risks: automatic commits to .gitignore, executing package manager installs/builds/tests that fetch and run third-party code, lack of input sanitization for branch/path values, and absence of sandboxing or explicit per-action confirmations. Mitigations: require explicit user approval before modifying repository or running networked installs/tests, strictly validate/escape branch and path inputs, run installs/tests in a restricted sandbox or with limited network/privilege policies, and consider package integrity checks/pinning.