git-worktree
Fail
Audited by Gen Agent Trust Hub on Mar 8, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
worktree-manager.shscript executes shell commands using unvalidated branch names. This allows for potential shell injection if characters like backticks or subshell expansions are used in branch name arguments.- [REMOTE_CODE_EXECUTION]: Inscripts/worktree-manager.sh, thesymlink_envfunction performs apython3 -ccall where the command string is built using direct interpolation of the$worktree_pathvariable. An attacker can use a single quote in a branch name to terminate the Python string and execute arbitrary Python code (e.g.,os.system).- [DATA_EXFILTRATION]: The skill automatically symlinks the root.envfile into subdirectories created for worktrees. This practice exposes sensitive environment variables and secrets to any process or tool operating within the worktree, increasing the risk of accidental exposure or exfiltration.- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it processes untrusted branch names and uses them in sensitive system operations. Ingestion points: branch_name and from_branch parameters inSKILL.md. Boundary markers: None. Capability inventory:python3subprocess execution,gitcommand execution, and file system writes. Sanitization: Only replaces slashes with dashes; no escaping for shell or Python quote characters.
Recommendations
- AI detected serious security threats
Audit Metadata