dspy-ruby
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- Dynamic Execution (HIGH): The file
references/core-concepts.mdandassets/signature-template.rbdescribe and provide signatures forDSPy::CodeAct. This feature allows the LLM to generate and execute Ruby code programmatically to solve tasks. If the input to this predictor is influenced by untrusted data, it facilitates arbitrary code execution within the host environment. - Indirect Prompt Injection (LOW): The skill is designed to ingest and process external data (e.g., email bodies, product reviews, user requirements) as seen in
assets/module-template.rbandassets/signature-template.rb. - Ingestion points:
email_bodyinChainOfThoughtModule,textandcontextinSentimentAnalysisSignature, andrequirementsinCodeGenerationSignature. - Boundary markers: Templates demonstrate standard Ruby string interpolation but do not explicitly implement or enforce boundary delimiters or instructions to ignore embedded commands.
- Capability inventory: High-impact capabilities are present, including
DatabaseQueryToolinAgentModuleand theCodeActpredictor for script execution. - Sanitization: No explicit sanitization or validation of the content of the natural language inputs is provided in the templates, relying solely on the LLM's internal guardrails.
- Command Execution (MEDIUM): The
AgentModuleinassets/module-template.rbdemonstrates the use of tools such asDatabaseQueryToolandCalculatorTool. Without strict input validation or sandboxing, these tools represent a significant attack surface for command or query injection.
Audit Metadata