worktree-manager
Warn
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/cleanup-worktree.shcontains the commandeval echo "$WORKTREE_PATH". The use ofevalon a variable that can be influenced by user input (via the agent) creates a shell injection vulnerability, allowing for arbitrary command execution if the path contains shell metacharacters. - [CREDENTIALS_UNSAFE]: The skill is designed to manage and load shared secrets from
~/eon/.env.alpha-forge. It automatically creates.envrcfiles in new worktrees that source this specific file. This pattern centralizes access to sensitive credentials, which could be exposed if a worktree is compromised. - [PROMPT_INJECTION]: The skill processes natural language descriptions to derive slugs for branch names and file paths, presenting an indirect prompt injection surface.
- Ingestion points: User-provided descriptions in Step 1 of
SKILL.mdwhich are passed to the--slugparameter of thecreate-worktree.shscript. - Boundary markers: The skill uses markdown tables and headers to separate instructions from data but lacks explicit delimiters or instructions to the model to ignore embedded commands within the descriptions.
- Capability inventory: The skill has the ability to write to the filesystem, execute Bash scripts, and perform Git operations (worktree and branch management).
- Sanitization: While
create-worktree.shperforms basic shell-based sanitization usingtrandcutto generate acronyms and slugs, it relies on the model to correctly transform input before it reaches the script.
Audit Metadata