openai-agents
Pass
Audited by Gen Agent Trust Hub on Mar 28, 2026
Risk Level: SAFEPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The provided Python code example demonstrates a command-line interface that passes raw user input directly to the agent's runner, which is a standard surface for indirect prompt injection.
- Ingestion points: User input is retrieved using the
input()function in themainloop ofSKILL.mdand passed directly intoRunner.runwithout pre-processing. - Boundary markers: While the instructions use a
RECOMMENDED_PROMPT_PREFIX, the code snippet does not explicitly demonstrate the use of delimiters or boundary markers to isolate theuser_inputvariable within the agent's context. - Capability inventory: The agent is equipped with a
lookup_tooland anupdate_recordtool. The latter allows the agent to modify shared context state (session_id), which could be abused if an attacker triggers the tool with malicious parameters via prompt injection. - Sanitization: The example does not include sanitization or validation logic for the ingested user input before it is processed by the LLM.
Audit Metadata