Scan Details

Project Name
Scan Timestamp
Agentic Framework
agentgateway-main
05/16/25 13:16:53
openai-agents
Dependency Check

Agentic Workflow Graph
Legend
Agent
Tool
Tool Category
CustomTool
Basic
MCP Server
Findings
Vulnerabilities
0
Agents
3
Tools
3
Nodes Overview

Agents
Agent Name LLM Model System Prompt
SQL Agent gpt-4o You are a SQL agent that processes user queries about the database. You can help users find information about users in the database. Use the available tools to answer user queries about the database. Format your responses in a clear and readable way.
Database Guardrail gpt-4o You are a guardrail agent that checks if queries are related to Postgres databases. If the query is about Postgres databases, pass the query to the SQL Agent. If the query is not about Postgres databases, return message: 'This query is not about Postgres database.'.
Gateway Agent gpt-4o You are a gateway agent that processes user queries. When receiving 'SQL INJECTION' in the query, return 'Better luck next time!' Otherwise, process the query directly.
Tools
Tool Name Tool Category Tool Description Number of Vulnerabilities
get_all_users_tool default Get all users from the database. Usage: Use when user asks to see all users or list all users. Example: "Show me all users" or "List all users in the database". Response format: "Here are all users in the database: [list of users]" 0
get_user_by_username_tool default Get a user by their username. Args: username: The username to search for. Usage: Use when user asks about a specific user by username. Example: "Find user with username 'john'" or "Get information about user 'alice'". Response format: "User information for [username]: [user details]" 0
get_user_by_email_tool default Get a user by their email address. Args: email: The email address to search for. Usage: Use when user asks about a user by their email. Example: "Find user with email 'john@example.com'" or "Get user information for 'alice@example.com'". Response format: "User information for email [email]: [user details]" 0
Agent Vulnerability Mitigations

Agent Name Vulnerability Mitigation Level* Explanation
SQL Agent Input Length Limit None There are no guardrails in place to mitigate this vulnerability.
Personally Identifiable Information (PII) Leakage None There are no guardrails in place to mitigate this vulnerability. There are no instructions in place to specifically prevent the leakage of personally identifiable information.
Harmful/Toxic/Profane Content None There are no guardrails in place to mitigate this vulnerability. There are no instructions in place to mitigate harmful, toxic, or profane content.
Jailbreak None There are no guardrails in place to mitigate this vulnerability. There are no instructions in place to prevent the AI from being manipulated or led to follow commands outside its intended guidelines.
Intentional Misuse None There are no guardrails in place to mitigate this vulnerability. There are no instructions in place to prevent misuse for tasks the AI is not intended for.
System Prompt Leakage None There are no guardrails in place to mitigate this vulnerability. There are no instructions in place to prevent the leakage of the system prompt.
Database Guardrail Input Length Limit None There are no guardrails in place to mitigate this vulnerability.
Personally Identifiable Information (PII) Leakage None There are no guardrails in place to mitigate this vulnerability. There are no instructions in place to mitigate the leakage of personally identifiable information.
Harmful/Toxic/Profane Content None There are no guardrails in place to mitigate this vulnerability. There are no instructions to filter or handle harmful, toxic, or profane content.
Jailbreak None There are no guardrails in place to mitigate this vulnerability. There are no instructions to prevent the agent from being manipulated or acting outside its intended guidelines.
Intentional Misuse Partial There are no guardrails in place to mitigate this vulnerability. The instructions ensure that any queries not related to Postgres databases are identified and returned with a message, preventing misuse.
System Prompt Leakage None There are no guardrails in place to mitigate this vulnerability. There are no instructions to prevent the user from extracting the system prompt or instructions.
Gateway Agent Input Length Limit None There are no guardrails in place to mitigate this vulnerability.
Personally Identifiable Information (PII) Leakage None There are no guardrails in place to mitigate this vulnerability. There are no instructions in place specifically addressing the leakage or handling of PII, so this vulnerability is not mitigated.
Harmful/Toxic/Profane Content None There are no guardrails in place to mitigate this vulnerability. There are no instructions in place to filter or handle harmful, toxic, or profane content, so this vulnerability is not mitigated.
Jailbreak None There are no guardrails in place to mitigate this vulnerability. There are no instructions regarding handling attempts by the user to make the AI act against its guidelines or instructions, so this vulnerability is not mitigated.
Intentional Misuse None There are no guardrails in place to mitigate this vulnerability. The system prompt primarily focuses on SQL injection detection but does not prevent users from using the agent for unintended purposes beyond that, so this vulnerability is not mitigated.
System Prompt Leakage None There are no guardrails in place to mitigate this vulnerability. There are no instructions in place to specifically prevent users from extracting the system prompt or instructions, so this vulnerability is not mitigated.
*The "Mitigation Level" column shows to what extent a vulnerability is mitigated. "Full" indicates that both a system prompt instruction and a guardrail are in place. "Partial" indicates that one of the two is in place. "None" indicates that neither one is in place. (This applies to all vulnerabilities except for the "Input Length Limit", in which case only the guardrail is taken into account).
Agent Vulnerability Explanations

Agent Vulnerability Framework Mapping Description
Input Length Limit
OWASP LLM Top 10:
LLM01 - Prompt Injection LLM10 - Unbounded Consumption
OWASP Agentic:
T2 - Tool Misuse T4 - Resource Overload T6 - Intent Breaking & Goal Manipulation T7 - Misaligned & Deceptive Behaviors
An attacker can overwhelm the LLM's context with a very long message and cause it to ignore previous instructions or produce undesired actions.
Mitigation:
- add a Guardrail that checks if the user message contains more than the maximum allowed number of characters (200-500 will suffice in most cases).
Personally Identifiable Information (PII) Leakage
OWASP LLM Top 10:
LLM02 - Sensitive Information Disclosure LLM05 - Improper Output Handling
OWASP Agentic:
T7 - Misaligned & Deceptive Behaviors T9 - Identity Spoofing & Impersonation T15 - Human Manipulation
An attacker can manipulate the LLM into exfiltrating PII, or requesting users to disclose PII.
Mitigation:
- add a Guardrail that checks user and agent messages for PII and anonymizes them or flags them
- include agent instructions that clearly state that it should not handle PII.
Harmful/Toxic/Profane Content
OWASP LLM Top 10:
LLM05 - Improper Output Handling
OWASP Agentic:
T7 - Misaligned & Deceptive Behaviors T11 - Unexpected RCE and Code Attacks
An attacker can use the LLM to generate harmful, toxic, or profane content, or engage in conversations about such topics.
Mitigation:
- add a Guardrail that checks user and agent messages for toxic, harmful, and profane content
- include agent instructions that prohibit the agent from engaging in conversation about, or creating, harmful, toxic, or profane content.
Jailbreak
OWASP LLM Top 10:
LLM01 - Prompt Injection LLM02 - Sensitive Information Disclosure LLM05 - Improper Output Handling LLM09 - Misinformation LLM10 - Unbounded Consumption
OWASP Agentic:
T1 - Memory Poisoning T2 - Tool Misuse T3 - Privilege Compromise T4 - Resource Overload T6 - Intent Breaking & Goal Manipulation T7 - Misaligned & Deceptive Behaviors T9 - Identity Spoofing & Impersonation T11 - Unexpected RCE and Code Attacks T13 - Rogue Agents in Multi-Agent Systems T15 - Human Manipulation
An attacker can try to craft their messages in a way that makes the LLM forget all previous instructions and be used for any task the attacker wants.
Mitigation:
- add a Guardrail that checks user messages for attempts at circumventing the LLM's instructions
- include agent instructions that state that the agent should not alter its instructions, and ignore user messages that try to convince it otherwise.
Intentional Misuse
OWASP LLM Top 10:
LLM01 - Prompt Injection LLM10 - Unbounded Consumption
OWASP Agentic:
T2 - Tool Misuse T4 - Resource Overload T6 - Intent Breaking & Goal Manipulation
An attacker can try to use the instance of the LLM for tasks other than the LLM's intended usage to drain resources or for personal gain.
Mitigation:
- add a Guardrail that checks user messages for tasks that are not the agent's intended usage
- include agent instructions that prohibit the agent from engaging in any tasks that are not its intended usage
System Prompt Leakage
OWASP LLM Top 10:
LLM01 - Prompt Injection LLM02 - Sensitive Information Disclosure LLM07 - System Prompt Leakage
OWASP Agentic:
T2 - Tool Misuse T3 - Privilege Compromise T6 - Intent Breaking & Goal Manipulation T7 - Misaligned & Deceptive Behaviors
An attacker can make the LLM reveal the system prompt/instructions so that he can leak sensitive business logic or craft other attacks that are better suited for this LLM.
Mitigation:
- add a Guardrail that checks agent messages for the exact text of the agent's system prompt
- include agent instructions that highlight that the system prompt/instructions are confidential and should not be shared.