a2a-protocol
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- Remote Code Execution (CRITICAL): The skill executes raw user input using the Python
eval()function. - Evidence: In
examples/simple_calculator_agent.py, theexecutemethod callseval(user_input). - Impact: Attackers can execute arbitrary Python commands, allowing for total control over the environment and the underlying host system.
- Indirect Prompt Injection (LOW): The skill lacks input sanitization for user-provided data processed by a high-risk capability.
- Ingestion point:
context.get_user_input()inexamples/simple_calculator_agent.py. - Boundary markers: Absent.
- Capability inventory:
eval()call inexamples/simple_calculator_agent.py. - Sanitization: Absent.
Recommendations
- AI detected serious security threats
Audit Metadata