Skip to content

[Bug]: Openhands May Suffer from Malicious Guide Injection via Tavily #10939

@BACMiao

Description

@BACMiao

Is there an existing issue for the same bug? (If one exists, thumbs up or comment on the issue instead).

  • I have checked the existing issues.

Describe the bug and reproduction steps

During our experiments, we found that Openhands does not perform any security review on the results returned from its internally configured Tavily service. This can cause Openhands to return harmful content to users after execution. Our experimental steps are as follows:

  1. We published some maliciously crafted content on GitHub and lured users into asking Openhands to perform a reverse access to that site (the malicious content could also be injected through comments).
Image
  1. When a user asked Openhands to create a travel guide based on the given link, Openhands directly passed the web content returned by Tavily to the LLM for content generation, and then displayed the generated result directly to the user.
Image Image

From the figure, it can be seen that Openhands generated a travel guide based on the webpage content and provided a highly realistic notification, instructing the user to make a payment via an Alipay link in order to obtain more information.

OpenHands Installation

CLI

OpenHands Version

OpenHands CLI v0.56.0

Model Name

gpt-4o

Operating System

MacOS

Logs, Errors, Screenshots, and Additional Context

Image

Metadata

Metadata

Assignees

No one assigned

    Labels

    bugSomething isn't workingsecurityRelated to security or privacy

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions