eino-agent
Warn
Audited by Gen Agent Trust Hub on Apr 8, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The Eino ADK framework documentation describes an
executetool (found inreference/deep-agents.mdandreference/filesystem.md) that enables agents to run arbitrary shell commands. This capability is integrated into theDeepAgentpre-built agent and depends on the implementation offilesystem.ShellorStreamingShellinterfaces. - [DATA_EXFILTRATION]: The skill documents tools for file system interaction, including
read_file,write_file, andedit_file(seereference/filesystem.md). When used with thelocalbackend, these tools grant the agent access to the host's filesystem, which could lead to unauthorized data reading or exfiltration if the agent is exposed to malicious instructions or is not properly restricted. - [PROMPT_INJECTION]: The skill describes an architecture (DeepAgent and various middlewares) that ingests and processes data from external sources such as local files, tool outputs, and sub-agent responses. This creates a surface for indirect prompt injection where untrusted data could influence the agent's behavior.
- Ingestion points: Data enters the agent context through the
read_filetool,Summarizationmiddleware, and sub-agent outputs via theAgentAsToolmechanism. - Boundary markers: The provided examples and instructions do not include specific boundary markers or "ignore embedded instructions" warnings for handling untrusted data.
- Capability inventory: The framework includes high-privilege capabilities such as shell execution (
execute) and filesystem writes (write_file,edit_file) across several scripts and configurations. - Sanitization: There is no evidence of sanitization, escaping, or validation logic for external content in the provided documentation.
Audit Metadata