Security
Version: ≥5.6.x
This document describes the security measures applied to EDDI's AI Agent Tooling system, particularly for tools that execute in response to LLM-generated arguments.
Threat Model
When an LLM is given access to tools, every argument it supplies must be treated as untrusted input. An attacker can craft prompts that cause the LLM to pass malicious arguments to tools — a class of attacks known as prompt injection. EDDI mitigates these risks at the tool-execution layer so that individual tools do not need to implement their own defences.
SSRF Protection — UrlValidationUtils
UrlValidationUtilsApplies to: PDF Reader, Web Scraper, and any future tool that fetches remote resources.
Server-Side Request Forgery (SSRF) occurs when an attacker tricks a server-side application into making requests to internal services. EDDI prevents this with UrlValidationUtils.validateUrl(url):
Scheme Allowlist
Only http and https URLs are accepted. All other schemes are rejected:
file://
file:///etc/passwd
ftp://
ftp://internal-server/data
jar://
jar:file:///app.jar!/secret
gopher://
gopher://127.0.0.1:25/...
Private / Internal IP Blocking
DNS resolution is performed and the resolved address is checked before any connection is made:
127.0.0.0/8
Loopback addresses
10.0.0.0/8
Private network (Class A)
172.16.0.0/12
Private network (Class B)
192.168.0.0/16
Private network (Class C)
169.254.0.0/16
Link-local (AWS/GCP metadata)
fd00::/8
IPv6 unique-local
fe80::/10
IPv6 link-local
::1
IPv6 loopback
Cloud Metadata Endpoint Blocking
Cloud provider metadata services are explicitly blocked by IP and hostname:
169.254.169.254(AWS, GCP, Azure metadata)metadata.google.internal(GCP)
Internal Hostname Blocking
Hostnames that indicate internal services are rejected:
localhostAny hostname ending in
.localAny hostname ending in
.internal
Usage
Sandboxed Math Evaluation — SafeMathParser
SafeMathParserApplies to: Calculator tool.
Problem
The original implementation used Java's ScriptEngine (Nashorn/Rhino) to evaluate math expressions. A malicious expression could execute arbitrary JavaScript:
Solution
The Calculator tool now uses SafeMathParser, a recursive-descent parser written in pure Java. It:
Recognises only numeric literals, arithmetic operators (
+,-,*,/,%,^), and parenthesesSupports a fixed allowlist of math functions (
sqrt,pow,abs,sin,cos,log,exp, etc.)Supports only two constants (
PI,E)Has no code execution capability — unrecognised tokens cause an immediate parse error
Requires no external dependencies (no Rhino/Nashorn/GraalJS)
Allowed Grammar
Supported Functions
sqrt, pow, abs, ceil, floor, round, sin, cos, tan, asin, acos, atan, atan2, log, log10, exp, signum/sign, toRadians, toDegrees, cbrt, min, max
Tool Execution Pipeline
All tool invocations — both built-in and HTTP-call-based — are routed through ToolExecutionService.executeToolWrapped(). This ensures consistent security and operational controls:
Rate Limiting
Algorithm: Token-bucket per tool name
Configuration:
enableRateLimiting(defaulttrue),defaultRateLimit(default100),toolRateLimits(per-tool overrides)Behaviour: Requests exceeding the limit receive a "Rate limit exceeded" error message returned to the LLM, which can then retry or use a different approach
Smart Caching
Key: SHA-256 hash of
toolName + argumentsConfiguration:
enableToolCaching(defaulttrue)Behaviour: Identical tool calls within the same conversation return cached results, reducing redundant API calls and cost
Cost Tracking
Configuration:
enableCostTracking(defaulttrue),maxBudgetPerConversation(no default — unlimited)Eviction: To prevent unbounded memory growth, the tracker caps per-conversation entries at 10 000 and evicts the oldest ~10% when the limit is reached
Behaviour: When the budget is exceeded, tools return a "Budget exceeded" message to the LLM
Configuration Example
Conversation Coordinator — Sequential Processing
The ConversationCoordinator ensures that messages for the same conversation are processed sequentially, preventing race conditions in conversation state. The isEmpty() → offer() → submit() sequence is wrapped in a synchronized block to prevent two concurrent requests from both being submitted to the thread pool simultaneously.
Different conversations are processed concurrently — only same-conversation messages are serialised.
HTTP Call Content-Type Handling
The HttpCallExecutor uses strict equality (equals) rather than prefix matching (startsWith) when checking the Content-Type header against application/json. This prevents content types like application/json-patch+json from being incorrectly deserialised as standard JSON.
Recommendations for New Tools
When adding a new tool to EDDI:
Validate all URLs with
UrlValidationUtils.validateUrl()before making any outbound requestNever use
ScriptEngineor any form of dynamic code evaluationAdd
@Toolannotations with clear descriptions so the LLM understands the tool's purpose and constraintsWrite unit tests that specifically verify rejection of malicious inputs (SSRF URLs, injection strings)
Route execution through
ToolExecutionServiceto inherit rate limiting, caching, and cost tracking
See Also
LangChain Integration — Full agent configuration reference
Bot Father LangChain Tools Guide — Guided tool setup
Architecture — EDDI's lifecycle pipeline and concurrency model
Metrics — Monitoring tool execution performance
Last updated
Was this helpful?