Oracle ADK Expert

Fail

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • Prompt Injection (HIGH): Indirect prompt injection vulnerability surface detected in core architecture patterns.
  • Ingestion points: Processes untrusted external content from slack_app.event ('message') and FastAPI chat_endpoint ('message').
  • Boundary markers: Code snippets lack delimiters or instructions to ignore embedded commands in user input.
  • Capability inventory: Agents are granted capabilities to query databases via SQLTool and access CRM data via get_customer_data function tools.
  • Sanitization: No evidence of input validation or sanitization before passing untrusted strings to the agent's execute or send methods.
  • Credentials Unsafe (HIGH): The skill provides patterns for accessing sensitive credential files.
  • Evidence: Explicitly directs the agent to load credentials from ~/.oci/config using oci.config.from_file.
  • Command Execution (MEDIUM): Implements dynamic execution of database queries.
  • Evidence: Uses oci_adk.tools.SQLTool which generates and executes SQL commands based on agent reasoning over user-provided data.
  • False Positive (INFO): The automated scan alert for 'logger.info' is a false positive.
  • Details: The scanner flagged logger.info as a malicious URL, but the file content shows it is a standard Python logging call: logger.info(f"Calling tool: {tool}").
Recommendations
  • AI detected serious security threats
  • Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 04:23 AM