dspy-react
Warn
Audited by Gen Agent Trust Hub on Mar 22, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The code example for the
calculatetool inSKILL.mduses theeval()function. This is a dangerous pattern that allows arbitrary Python code execution if the input expression, which is generated by the agent in response to user input, is maliciously crafted. - [EXTERNAL_DOWNLOADS]: The skill uses the
requestslibrary to fetch data from well-known external services, including the GitHub API (api.github.com) and PyPI (pypi.org). While these are trusted services, the practice of fetching external content is documented as an external data dependency. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it processes content from external sources and feeds it into the reasoning loop without sanitization.
- Ingestion points:
get_github_issues,search_pypi, andget_github_repotools inexamples.md. - Boundary markers: No clear delimiters or instructions to ignore embedded commands are present in the agent prompts or tool outputs.
- Capability inventory: The agent can make network requests via
requestsand potentially execute arbitrary code if theeval-basedcalculatetool is implemented. - Sanitization: There is no evidence of filtering, escaping, or validation of the data retrieved from external APIs before it is used in the prompt.
Audit Metadata