spec-kit-parallel-orchestrator

Fail

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [Unverifiable Dependencies & Remote Code Execution] (CRITICAL): The manifest file 'patches/manifests/long-running-harness.full.manifest.json' explicitly directs the agent or user to install the skill using a 'curl | bash' one-liner from an untrusted GitHub repository (rexleimo/rex-skills). This allows the remote author to execute arbitrary code on the host machine.
  • [Dynamic Execution] (HIGH): Scripts such as 'harness-end.sh' and 'harness-verify-e2e.sh' parse an 'e2e_command' from the '.harness-config.json' file and execute it using 'bash -c'. This provides a direct path for arbitrary command execution.
  • [External Downloads] (MEDIUM): The 'scripts/uninstall.sh' script dynamically downloads a patch file from a non-whitelisted domain using 'curl'.
  • [Privilege Escalation] (MEDIUM): 'scripts/harness-init.sh' applies 'chmod +x' to a newly created 'init.sh' script. While intended for setup, this is a risk if the file contents are externally influenced.
  • [Indirect Prompt Injection] (LOW): The skill is vulnerable to indirect prompt injection (Category 8). Evidence: 1. Ingestion points: feature descriptions and steps are read from 'feature_list.json'. 2. Boundary markers: Absent. 3. Capability inventory: The skill has high-privilege capabilities including shell command execution ('bash -c') and git commit operations across all harness scripts. 4. Sanitization: Absent. Input from the JSON file is interpolated directly into progress logs and session plans without escaping or validation.
Recommendations
  • HIGH: Downloads and executes remote code from: https://raw.githubusercontent.com/rexleimo/rex-skills/main/spec-kit-parallel-orchestrator/scripts/uninstall.sh, https://raw.githubusercontent.com/rexleimo/rex-skills/main/spec-kit-parallel-orchestrator/scripts/install.sh - DO NOT USE without thorough review
  • AI detected serious security threats
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 17, 2026, 06:51 PM