langgraph-supervisor
Warn
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: MEDIUMPROMPT_INJECTION
Full Analysis
- Indirect Prompt Injection (MEDIUM): The implementation pattern for the LLM-based supervisor in
references/llm-supervisor.mdis vulnerable to indirect prompt injection. It interpolates thestate['input'](untrusted data) directly into the routing prompt. An attacker could provide input designed to trick the supervisor into choosing a specific next agent or finishing prematurely, potentially bypassing intended workflow constraints. - Ingestion points:
state['input']in thellm_supervisorfunction inreferences/llm-supervisor.md. - Boundary markers: Absent; untrusted data is directly concatenated into the F-string prompt template.
- Capability inventory: Controls the execution flow of the agentic graph (routing decisions with side effects).
- Sanitization: Absent; no validation or escaping of the user input before interpolation.
- Logic Bypass (LOW): The
should_skip_agentfunction inreferences/priority-routing.mdcontains logic to bypass the 'security' agent if atrusted_sourceflag is found in the state. If the state is corrupted via prompt injection in a previous node, this facilitates a direct security bypass.
Audit Metadata