-
Notifications
You must be signed in to change notification settings - Fork 2
research(security): pre-execution action verification plugin hook in CompositeExecutor (TrustBench pattern) #1630
Copy link
Copy link
Closed
Labels
enhancementNew feature or requestNew feature or requestresearchResearch-driven improvementResearch-driven improvement
Description
Research Finding
TrustBench (arXiv:2603.09157, Mar 10, 2026) intercepts agent actions after formulation but before execution using domain-specific plugins. Reports 87% reduction in harmful actions at sub-200ms latency. MIT license.
Applicability
Zeph's CompositeExecutor pipeline already passes tool calls through ExfiltrationGuard and shell sandbox. TrustBench's pre-execution plugin architecture extends this:
- Add a
PreExecutionVerifiertrait tozeph-tools CompositeExecutorcalls verifier(s) before dispatching to the actual executor- Domain-specific rule sets (e.g., disallow destructive shell commands outside allowed_paths, disallow tool URLs matching injection patterns)
The sub-200ms latency is compatible with interactive sessions.
Design Sketch
trait PreExecutionVerifier: Send + Sync {
fn verify(&self, tool_name: &str, args: &serde_json::Value) -> VerificationResult;
}
enum VerificationResult {
Allow,
Block { reason: String },
Warn { message: String },
}Integrate after ExfiltrationGuard in CompositeExecutor::execute.
Source
Research session 2026-03-13. arXiv:2603.09157 (TrustBench). MIT license.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
enhancementNew feature or requestNew feature or requestresearchResearch-driven improvementResearch-driven improvement