NYC

harness

Fail

Audited by Socket on Feb 18, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

[Skill Scanner] Destructive bash command detected (rm -rf, chmod 777) All findings: [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] The harness framework is internally consistent and purpose-aligned as a long-running agent orchestrator with progress persistence, recovery, and dependency management. It is not inherently malicious, but it introduces a high-privilege execution surface through arbitrary task commands and system-modifying utilities (git resets, docker cleanup). Security posture hinges on trusted task definitions, strict isolation, and controls on the command surface. Recommend governance controls, sandboxing, and output sanitization to mitigate operational risk. LLM verification: This skill (harness) is functionally aligned with its stated purpose (long-running multi-session agent with checkpointing and recovery). However, it carries significant operational risk: it reads executable command strings from workspace state (harness-tasks.json) and runs system-level commands (git reset --hard, docker compose down, npm/pip installs, and possibly rm -rf). If task files or progress logs are untrusted or can be modified by an attacker, the harness provides a direct command-execut

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 18, 2026, 10:24 PM
Package URL
pkg:socket/skills-sh/cexll%2Fmyclaude%2Fharness%2F@c15d7f28d6560c3fb8167171745a80312c8a2454