dspy
Pass
Audited by Gen Agent Trust Hub on Mar 28, 2026
Risk Level: SAFEREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill documents the
ProgramOfThoughtmodule, which generates and executes Python code. Examples also include acalculatetool usingeval()with restricted builtins.\n- [EXTERNAL_DOWNLOADS]: Instructions are provided to install the DSPy library from its official GitHub repository (stanfordnlp/dspy).\n- [PROMPT_INJECTION]: The skill documents systems that ingest data from untrusted sources (vector databases, web search) and possess code-execution capabilities, creating a surface for indirect prompt injection (Category 8). \n - Ingestion points:
InputFieldin signatures andRetrievemodules.\n - Boundary markers: Not explicitly defined; the framework relies on prompt formatting for separation.\n
- Capability inventory: Includes code execution via
ProgramOfThoughtand arbitrary tool execution viaReAct.\n - Sanitization: Examples show restricted
eval()builtins, but general data ingestion lacks validation.
Audit Metadata