observing-agentforce
Pass
Audited by Gen Agent Trust Hub on Apr 8, 2026
Risk Level: SAFEREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: Deploys a vendor-authored Apex class (
AgentforceOptimizeService.cls) to the Salesforce environment to enable specialized STDM (Session Trace Data Model) queries. - [COMMAND_EXECUTION]: Extensively uses the Salesforce CLI (
sf) to interact with the target org, query data, and manage agent preview sessions, including the use of dynamically generated Apex scripts via thesf apex runcommand. - [PROMPT_INJECTION]: Vulnerable to indirect prompt injection as it ingests and processes raw conversation traces (user utterances and agent responses) from production sessions.
- Ingestion points: Data Cloud query results and local trace files from
sf agent preview. - Boundary markers: The instructions lack explicit delimiters or warnings to ignore instructions embedded within the processed trace data.
- Capability inventory: The skill has access to powerful tools including
Bash,Write, andEdit, which could be abused if the agent inadvertently follows instructions in the ingested data. - Sanitization: Conversation content is presented for analysis without escaping or filtering of potentially malicious instructions.
Audit Metadata