harness-engineering-orchestrator
Fail
Audited by Gen Agent Trust Hub on Mar 28, 2026
Risk Level: HIGHPROMPT_INJECTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: Indirect prompt injection attack surface identified (Category 8).
- Ingestion points: Processes untrusted project documentation such as
docs/PRD.mdanddocs/ARCHITECTURE.mdto drive the orchestration logic. - Boundary markers: Utilizes decorative markers (e.g.,
═,─) inreferences/runtime/orchestrator/context-builder.tsbut lacks explicit structural delimiters or warnings to ignore embedded instructions in data. - Capability inventory: Possesses significant capabilities across the runtime files including subprocess execution (
Bun.spawninreferences/runtime/validation/helpers.ts), arbitrary file system writes (writeFileSync), and network health checks. - Sanitization: Lacks sanitization or escaping of the ingested document content before it is interpolated into the agent context.
- [EXTERNAL_DOWNLOADS]: Downloads and executes the Bun runtime installer from
https://bun.sh/install(for Unix) orbun.sh/install.ps1(for Windows) during the setup phase if the runtime is missing. - [COMMAND_EXECUTION]: Executes a wide variety of shell commands derived from the
state.toolchainconfiguration, includinggit,bun,npm, andturbooperations, which is intended but represents a risk if the state is manipulated.
Recommendations
- HIGH: Downloads and executes remote code from: https://bun.sh/install - DO NOT USE without thorough review
Audit Metadata