harness-engineering-playbook
Pass
Audited by Gen Agent Trust Hub on Feb 20, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- PROMPT_INJECTION (LOW): The skill is susceptible to indirect prompt injection (Category 8) as it identifies and executes build/test commands (e.g.,
npm run lint,cargo test) based on the content of configuration files likepackage.jsonorpyproject.tomlin the target repository. \n- Ingestion points: Target repository configuration files (processed inscripts/harness/*.shtemplates). \n- Boundary markers: Absent; the skill lacks specific delimiters to isolate untrusted repository data. \n- Capability inventory: Local execution of package manager commands andsubprocess.runcalls withinscripts/harness_wizard.py. \n- Sanitization: None; the tool is designed to execute the commands defined within the target repository. \n- COMMAND_EXECUTION (LOW): The skill performs local command execution (Category 10) to facilitate repository bootstrapping and auditing. The provided harness templates utilizeevalto support command overrides via environment variables (e.g.,HARNESS_LINT_CMD). While these are standard practices for developer-oriented automation tools, they constitute dynamic execution capabilities.
Audit Metadata