dspy-development
Warn
Audited by Gen Agent Trust Hub on Feb 24, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The script
scripts/test-signature.pyutilizesimportlib.import_module()to load Python modules based on a user-provided command-line argument (--module). This implementation allows for dynamic loading and execution of arbitrary code from any module reachable in the Python path. - [COMMAND_EXECUTION]: The
scripts/clear-cache.pyscript performs recursive directory deletion usingshutil.rmtree()on a directory path specified by the user through the--cache-dirargument. This capability can be used to delete arbitrary directories on the filesystem if misused. - [PROMPT_INJECTION]: The
scripts/optimize-dspy.pyscript creates an indirect prompt injection surface by ingesting untrusted training data to optimize DSPy programs. - Ingestion points: Training examples are loaded from a JSONL file path provided via the
--examplesargument inscripts/optimize-dspy.py. - Boundary markers: The script lacks boundary markers or explicit instructions to the LLM to disregard potentially malicious instructions embedded within the training examples.
- Capability inventory: The skill environment possesses capabilities for file creation, file deletion, and dynamic module loading.
- Sanitization: Input data from the JSONL files is processed without validation or sanitization, which could allow adversarial examples to influence the behavior of the optimized model.
Audit Metadata