harness-engineering
Audited by Socket on Apr 10, 2026
2 alerts found:
Anomalyx2This configuration is primarily a powerful auto-execution mechanism that runs three repository-local Python scripts from `.codex/hooks/` on common workflow events. The snippet itself shows no explicit malicious payload, but it creates a straightforward pathway for compromised repository content to execute arbitrary code under the privileges of the running process. Risk is therefore moderate-to-high and should be validated by inspecting the referenced scripts and the integrity/permission model for `.codex/hooks/` contents.
This fragment is a hook/permission configuration that executes three local Python scripts on sensitive lifecycle events (including user prompt submission) and grants a broad shell/tool execution surface (notably npm/npx/node/git plus filesystem operations). The snippet itself shows no explicit credentials, network, or exfiltration; however, it creates a high-impact control-plane path where any malicious or compromised code inside .claude/hooks/*.py (especially the context-injector) could tamper with agent behavior and potentially trigger harmful actions through the allowed command surface. Inspect and validate the actual hook script contents and the workflow’s data-access/network constraints.