Defense-in-depth against indirect prompt injection across all external data sources.
Zeph processes data from web scraping, MCP servers, A2A agents, tool results, and memory retrieval — all of which may contain adversarial instructions. This epic implements multi-layered isolation: content sanitization with spotlighting, quarantined summarization, exfiltration guards, and TUI visibility.
Research: .local/plan/untrusted-content-isolation.md
Phase 1: Core Infrastructure
Phase 2: Source-Specific Integration
Phase 3: Quarantined Summarizer
Phase 4: Exfiltration Guards
Phase 5: UI Integration
References
Cross-Epic Dependencies (with #1222 Graph Memory)
| Security Epic |
Graph Memory |
Relationship |
| #1207 (memory write poisoning) |
#1225 (extraction write) |
Graph extraction is a new write path into memory — guard must cover GraphStore writes |
| #1203 (memory retrieval sanitization) |
#1226 (graph retrieval) |
graph_recall() is a new read path — sanitizer must cover graph facts |
| #1204 (quarantined summarizer) |
#1228 (community summaries) |
Shared pattern: isolated LLM call — first implemented sets the abstraction |
Defense-in-depth against indirect prompt injection across all external data sources.
Zeph processes data from web scraping, MCP servers, A2A agents, tool results, and memory retrieval — all of which may contain adversarial instructions. This epic implements multi-layered isolation: content sanitization with spotlighting, quarantined summarization, exfiltration guards, and TUI visibility.
Research:
.local/plan/untrusted-content-isolation.mdPhase 1: Core Infrastructure
Phase 2: Source-Specific Integration
Phase 3: Quarantined Summarizer
Phase 4: Exfiltration Guards
Phase 5: UI Integration
References
Cross-Epic Dependencies (with #1222 Graph Memory)
GraphStorewritesgraph_recall()is a new read path — sanitizer must cover graph facts