AgentShield: Runtime security guard for Haystack pipeline tool calls #11140
hidearmoon
started this conversation in
Show and tell
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Hi Haystack community!
We've open-sourced AgentShield, a runtime security layer for AI agents that intercepts tool calls before execution. We think it's a natural fit for Haystack pipelines where agents invoke tools.
The problem
When a Haystack agent processes external data (emails, web pages, RAG documents) and has access to tools, a prompt injection hidden in that data can trick the agent into misusing tools — sending unauthorized emails, exfiltrating data, or executing malicious code.
How AgentShield helps
Every tool call passes through a multi-layer security pipeline:
Integration with Haystack
AgentShield can integrate as a pipeline component that wraps tool-calling nodes:
Or as a pre-execution guard in custom components that checks tool name + params against policy before forwarding to the actual tool.
We also have a transparent sidecar proxy mode that requires zero code changes — it intercepts HTTP traffic between the agent and tool services.
Links
Would love to hear from Haystack users about your security concerns with agent tool execution. Happy to build a dedicated Haystack component if there's interest.
Beta Was this translation helpful? Give feedback.
All reactions