dspy-gepa
Fail
Audited by Gen Agent Trust Hub on Feb 24, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION]: The evaluation script
scripts/gepa_evaluate.pyutilizes theeval()function to process the--modulecommand-line argument. This allows for arbitrary Python code execution if a user or an agent provides a maliciously crafted string to the tool. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection during the scenario generation process.
- Ingestion points: External data enters the prompt context via the
--skill-descriptionand--scenariosarguments inscripts/gepa.py. - Boundary markers: No specific delimiters or "ignore embedded instructions" warnings are used to isolate untrusted content from the system instructions.
- Capability inventory: The script has the capability to write files to the local system as seen in
scripts/gepa.py(line 301). - Sanitization: Input data is interpolated directly into DSPy signatures without any escaping or validation logic.
- [EXTERNAL_DOWNLOADS]: The skill requires standard Python packages including
dspy-ai,pyyaml, andjsonschemaas noted in the installation instructions and import statements.
Recommendations
- AI detected serious security threats
Audit Metadata