Prompt injection detection in goose #4638
dorien-koelemeijer
started this conversation in
Show and tell
Replies: 1 comment
-
|
Thank you for sharing this important discussion topic here! Security is always an important concern. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
What Is Prompt Injection?
Prompt injection is a security vulnerability where malicious commands are embedded in content that goose processes. These attacks can trick goose into running dangerous system commands, accessing sensitive files, or executing unintended actions on your system.
These threats can come from:
Example: You download a helpful-looking recipe for "organising project files" that actually contains hidden commands to access your sensitive data.
How Goose Protects You
Goose will include built-in security scanning that analyses tool calls before they execute from the next release onwards. Our security system:
What You'll Experience
When goose detects a potentially malicious tool call, you'll see:
How To Enable Prompt Injection Protection
To enable security protection in goose, simply update your goose config to include the following (this config will change slightly in the next release):
Or enable in the UI (available soon):

The threshold (0.0 to 1.0) controls how sensitive the security scanning is:
What’s Next
This is the first iteration of goose's security protection, using pattern-based detection. We're actively working on adding AI model-based scanning for more sophisticated prompt injection detection in future releases.
Beta Was this translation helpful? Give feedback.
All reactions