harness-init-runner
Pass
Audited by Gen Agent Trust Hub on Apr 15, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill implements a runner in
harness/run.mjsand a diagnostic tool inharness/doctor.mjsthat execute external CLI commands (likeclaudeorgemini) using thenode:child_processspawn API. The specific commands and arguments are configurable by the user via theharness.config.jsonfile. - [EXTERNAL_DOWNLOADS]: The initialization process adds the
zodpackage (a well-known schema validation library) to the project'spackage.jsonand instructs the agent to runnpm installto set up the environment. - [PROMPT_INJECTION]: The skill includes an 'Indirect Prompt Injection' surface where task text from the command line or standard input is interpolated into a prompt and passed to external tools. To mitigate this, it provides a 'human gate' mechanism (
harness/lib/human-gate.mjs) that scans the task text for sensitive keywords (e.g.,sudo,rm -rf,api-key) and warns the operator before execution. - [DATA_EXFILTRATION]: Execution artifacts, including task prompts and output logs, are stored locally in the
/.harness/directory. The skill explicitly adds this path to the project's.gitignorefile to ensure that potentially sensitive runtime data is not accidentally committed to version control.
Audit Metadata