worktree-fleet
Warn
Audited by Gen Agent Trust Hub on May 14, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The
launch.shscript extracts thebranchfield fromfleet.jsonand interpolates it into a shell command string that is executed viabash -cin atmuxsession. Since thebranchname is not validated against a safe character set, a malicious configuration file could inject arbitrary commands (e.g., using backticks or semicolons). - [COMMAND_EXECUTION]: The
status.shscript extracts cost and usage metrics from worker log files and injects them directly intopython3 -candawkcommand strings for calculation. If an agent's session log is manipulated to return a specially crafted string instead of a number, it can lead to arbitrary code execution when the operator runs the status command. - [COMMAND_EXECUTION]: The overall architecture of the skill relies on complex dynamic code generation and string interpolation across
launch.sh,worker-spawn.sh, andstatus.sh. The transition of data from JSON files through shell variables into multiple execution environments (Tmux, Python, Awk) creates a high risk of injection vulnerabilities due to inconsistent sanitization. - [EXTERNAL_DOWNLOADS]: The skill relies on external CLI tools such as
claude,codex,pi, andtmux. While these are well-known developer tools, the skill requires them to be present in the system environment to function.
Audit Metadata