google-adk
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [Data Exposure & Exfiltration] (LOW): The skill performs network operations using
httpxandrequeststargetingapi.example.comandlocalhost:3000(MCP server). These domains are not on the trusted whitelist. Additionally, thefetch_external_data(url)tool ingoogle_adk_tools_example.pyaccepts an arbitrary URL, which is a potential SSRF (Server-Side Request Forgery) sink if used without proper domain filtering. - [Indirect Prompt Injection] (LOW): The agents ingest untrusted external data from multiple points (API responses, news feeds, content critique) across
google_adk_agent_implementation.pyandgoogle_adk_tools_example.py. - Ingestion points:
fetch_user_data,get_company_news,critique_content. - Boundary markers: Generally absent in the prompt templates.
- Capability inventory: High-privilege tools such as
send_emailanddelete_user_accountare present. - Sanitization: The
send_email_tooldemonstrates basic regex validation and HTML tag removal, and the skill explicitly usesConfirmationMode.ALWAYSto require human approval for high-risk operations, significantly mitigating the risk. - [Remote Code Execution] (SAFE): No execution of remote scripts, piping of web content to shells, or unsafe dynamic evaluation of code was detected.
- [Credentials Unsafe] (SAFE): No hardcoded API keys, tokens, or other secrets were found in the examples.
Audit Metadata