harness-engineering-playbook

Warn

Audited by Gen Agent Trust Hub on Mar 24, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill provides template shell scripts designed to be installed into target repositories that utilize the eval command to execute arbitrary shell instructions stored in environment variables.
  • Evidence: .skills/harness-engineering-playbook/assets/templates/scripts/harness/lint.sh contains eval "$HARNESS_LINT_CMD".
  • Evidence: .skills/harness-engineering-playbook/assets/templates/scripts/harness/smoke.sh contains eval "$HARNESS_SMOKE_CMD".
  • Evidence: .skills/harness-engineering-playbook/assets/templates/scripts/harness/test.sh contains eval "$HARNESS_TEST_CMD".
  • Evidence: .skills/harness-engineering-playbook/assets/templates/scripts/harness/typecheck.sh contains eval "$HARNESS_TYPECHECK_CMD".
  • [PROMPT_INJECTION]: The skill creates an indirect prompt injection surface by automatically discovering and executing commands defined within untrusted repository configuration files.
  • Ingestion points: Target repository configuration files including package.json, Cargo.toml, and pyproject.toml are parsed to determine execution logic.
  • Boundary markers: No boundary markers or 'ignore' instructions are used when processing these external configurations.
  • Capability inventory: The skill enables execution of npm run, cargo check, pytest, and other toolchains through its harness scripts.
  • Sanitization: No sanitization or validation is performed on the command strings or script names extracted from the target repository's configuration files before they are passed to the shell for execution.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 24, 2026, 04:07 PM