-
Notifications
You must be signed in to change notification settings - Fork 2
[SEC-4.2] Tool call argument validation guard #1206
Copy link
Copy link
Closed
Labels
priority/highHigh priorityHigh prioritysecuritySecurity-related issueSecurity-related issuesize/MMedium PR (51-200 lines)Medium PR (51-200 lines)toolsTool execution and MCP integrationTool execution and MCP integration
Description
Part of #1195 — Phase 4
Detect when tool call arguments contain URLs or commands that originated from untrusted content rather than the user.
Crates: zeph-core, zeph-tools
Depends on: SEC-1.4, SEC-2.1
Tasks:
- Track URLs and command strings seen in untrusted content (taint set)
- Before tool execution: check if arguments contain tainted strings
- If tainted: log
tracing::warn!, require user confirmation (human-in-the-loop) - Config:
[security.exfiltration_guard] validate_tool_urls = true - Unit tests: tool call with URL from web scrape result, tool call with clean URL
Files: crates/zeph-core/src/sanitizer/exfiltration.rs, crates/zeph-tools/src/audit.rs
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
priority/highHigh priorityHigh prioritysecuritySecurity-related issueSecurity-related issuesize/MMedium PR (51-200 lines)Medium PR (51-200 lines)toolsTool execution and MCP integrationTool execution and MCP integration