-
Notifications
You must be signed in to change notification settings - Fork 2
[SEC-2.4] Memory retrieval sanitization boundary #1203
Copy link
Copy link
Closed
Labels
memoryzeph-memory crate (SQLite)zeph-memory crate (SQLite)priority/mediumMedium priorityMedium prioritysecuritySecurity-related issueSecurity-related issuesize/SSmall PR (11-50 lines)Small PR (11-50 lines)
Description
Part of #1195 — Phase 2
Apply sanitization to memory search results (Qdrant/SQLite) to prevent poisoned memory attacks.
Crates: zeph-memory
Depends on: SEC-1.4
Tasks:
-
SemanticMemory::search()results taggedExternalUntrusted(memory could have been poisoned by earlier injected content) - Apply
ContentSanitizerto retrieved memory entries before returning to agent -
tracing::warn!if injection patterns detected in stored memory (indicates prior poisoning) - Unit tests with mock memory entry containing injection payload
Files: crates/zeph-memory/src/orchestrator.rs
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
memoryzeph-memory crate (SQLite)zeph-memory crate (SQLite)priority/mediumMedium priorityMedium prioritysecuritySecurity-related issueSecurity-related issuesize/SSmall PR (11-50 lines)Small PR (11-50 lines)