harness-plan
Pass
Audited by Gen Agent Trust Hub on Mar 28, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The skill identifies a surface for indirect prompt injection because it processes untrusted data from web search results and repository history to generate plans and update status.\n
- Ingestion points: Output from the
WebSearchtool, content ofPlans.md, outputs fromgit log, and the.claude/state/agent-trace.jsonlfile.\n - Boundary markers: The instructions do not define delimiters or specific safety instructions to disregard commands embedded in the processed data.\n
- Capability inventory: The skill has access to
Write,Edit, andBashtools, which allow for extensive file manipulation and system command execution.\n - Sanitization: No explicit validation or sanitization of the external or repository-sourced data is described before processing.\n- [COMMAND_EXECUTION]: The skill uses the
Bashtool to execute local shell commands for auditing the current project state.\n - Evidence: Uses commands such as
git status,git diff,git log,cat,tail, andjqto extract information for synchronization.\n - Internal state access: Reads operational metadata from
.claude/state/agent-trace.jsonland writes memory records to the.claude/agent-memory/directory.
Audit Metadata