This document summarizes research into security risks associated with DNA sequencing and analysis. The researchers demonstrated the first example of compromising a computer system using synthesized DNA by encoding an exploit into DNA strands that generated a file giving remote code execution when processed. They also observed unintended information leakage between samples during sequencing due to sample multiplexing techniques. Additionally, they found that DNA analysis software lacks modern security practices and contains buffer overflow vulnerabilities. Based on these findings, the researchers presented a threat model and recommendations to help safeguard security and privacy in the DNA processing pipeline.