using-git-worktrees
Audited by Socket on Feb 28, 2026
1 alert found:
MalwareFunctionally, the module is a pragmatic automation for creating isolated git worktrees and preparing a development baseline. The primary security concerns are operational: (1) auto-editing and committing .gitignore entries without explicit, recorded user approval; (2) automatically running dependency installs, builds, and tests which may execute arbitrary code from third-party packages; and (3) lack of explicit sandboxing or privilege limitation when running untrusted project code. There is no clear evidence of intentionally malicious code patterns (backdoors, obfuscated payloads, hard-coded credentials, or explicit data-exfiltration channels) in the provided text. Recommended mitigations: require explicit, per-action user confirmations for repository-modifying steps; run installs/tests in ephemeral sandboxes or with network/credential restrictions for untrusted repositories; and log/preview any commits before applying them.