gtr-workflow
Fail
Audited by Gen Agent Trust Hub on Mar 18, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The installation section instructs the user to execute a command with
sudoto create a symbolic link in/usr/local/bin. This grants administrative privileges to the installation process and modifies system-level directories. - [EXTERNAL_DOWNLOADS]: The skill provides instructions to download and install external code from a third-party GitHub repository:
https://github.com/coderabbitai/git-worktree-runner.git. - [COMMAND_EXECUTION]: The skill documentation describes a "hooks" feature (
postCreate) within the.gtrconfigfile that automatically executes shell commands, such asnpm installorcp .env.example .env, when a new worktree is created. - [PROMPT_INJECTION]: The skill identifies a potential indirect injection surface by processing untrusted data from repository configuration files.
- Ingestion points: Reads instructions and configurations from the
.gtrconfigfile located in the repository root. - Boundary markers: None identified; the skill assumes the configuration file is trusted.
- Capability inventory: The tool can execute arbitrary shell commands via the
runcommand and automatedpostCreatehooks. - Sanitization: There is no evidence of sanitization or validation of the commands specified in the configuration file before execution.
Recommendations
- AI detected serious security threats
Audit Metadata