Skip to content

Conversation

@siacomuzzi
Copy link
Member

@siacomuzzi siacomuzzi commented May 1, 2025

Pending

  • Remove CIBA polling/blocking mode
  • Auth between agents

How it works

image

try:
user_id = get_user_id_by_email(work_email)
access_token = get_hr_api_access_token(user_id=user_id)
response = requests.get(f"{os.getenv('HR_API_BASE_URL')}/employees/{user_id}", headers={
Copy link

@semgrep-code-auth0-lab semgrep-code-auth0-lab bot May 1, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Untrusted input might be used to build an HTTP request, which can lead to a Server-side request forgery (SSRF) vulnerability. SSRF allows an attacker to send crafted requests from the server side to other internal or external systems. SSRF can lead to unauthorized access to sensitive data and, in some cases, allow the attacker to control applications or systems that trust the vulnerable service. To prevent this vulnerability, avoid allowing user input to craft the base request. Instead, treat it as part of the path or query parameter and encode it appropriately. When user input is necessary to prepare the HTTP request, perform strict input validation. Additionally, whenever possible, use allowlists to only interact with expected, trusted domains.

Removed in commit d39ca7b

@siacomuzzi siacomuzzi changed the title chore: a2a sample (v0.0.1) chore: A2A sample (v0.0.1) May 1, 2025
@siacomuzzi siacomuzzi force-pushed the a2a_sample branch 2 times, most recently from d39ca7b to 102fac3 Compare May 8, 2025 17:45
@siacomuzzi siacomuzzi changed the title chore: A2A sample (v0.0.1) chore: A2A sample May 9, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants