Ensure that the repository directory is owned by the current user; this prevents us from opening configuration files that may have been created by an attacker.