harness
Audited by Socket on Mar 1, 2026
2 alerts found:
Obfuscated FileMalwareThis configuration is a high-risk mechanism for enabling arbitrary code execution at important lifecycle events. The JSON itself contains no hardcoded secrets or embedded malicious payloads, but it intentionally registers hooks that can prevent shutdown and maintain activity, which is suspicious. If the hooks directory or the CLAUDE_PLUGIN_ROOT environment variable is writable or controlled by an untrusted party, an attacker can execute arbitrary Python code with the host process privileges and potentially implement persistence, exfiltration, or shutdown interference. Recommended actions: audit the actual hook scripts, restrict write access to the hooks directory and who can set CLAUDE_PLUGIN_ROOT, implement integrity checks (signatures or hashes) for hook scripts, run hooks with least privilege in a sandboxed environment, and add monitoring/alerts on lifecycle hook execution.
The Harness fragment presents a coherent, legitimate long-running agent framework with robust progress persistence, recovery, and task dependency management. No embedded secrets or external data exfiltration patterns are evident. The primary security considerations center on operational risk: lock integrity, atomic writes, validation command trust, and the potential for destructive git operations. To improve safety in production, enforce strict access controls, validate task metadata prior to execution, implement immutable provenance for task definitions, and harden the concurrency model with explicit error-handling and rollback guarantees.