cmux-and-worktrees
Warn
Audited by Gen Agent Trust Hub on Mar 19, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill directs the agent to execute
bash .cmux/setupand variouscmuxcommands. Executing local scripts is a security risk in agentic workflows as it allows for arbitrary command execution within the agent's environment.\n- [REMOTE_CODE_EXECUTION]: By instructing the agent to run scripts from the repository (such as.cmux/setup), the skill creates a pathway for executing code provided by external repository authors, which can lead to remote code execution if the repository source is malicious.\n- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection via the.cmux/setupscript. An attacker could influence the agent's actions by placing malicious instructions or commands inside this file, which the agent is trained to execute by default.\n - Ingestion points: The
.cmux/setupscript located in the repository root.\n - Boundary markers: None. The skill does not instruct the agent to inspect or validate the script's contents before execution.\n
- Capability inventory: Shell execution (
bash), file modification (echoto.gitignore), and use of thecmuxCLI tool.\n - Sanitization: None. The agent executes the script directly.\n- [EXTERNAL_DOWNLOADS]: The
cmux updatecommand implies that the tool can download and install code from external sources. The origin, integrity, and safety of these updates are not specified or verified within the skill's instructions.
Audit Metadata