-
Notifications
You must be signed in to change notification settings - Fork 3k
Open
Labels
tools[Component] This issue is related to tools[Component] This issue is related to tools
Description
Problem
High-risk tool execution can proceed without an explicit confirmation policy in ambiguous configurations, which weakens safety boundaries for agent/tool orchestration.
Why now
ADK is increasingly used in environments where tool execution safety controls must be explicit and auditable.
Evidence Packet
- Version/commit under test:
origin/mainat3256a679da3e - Runtime environment: macOS 26.3 (arm64), Python 3.14.0
- Minimal repro:
- Configure agent with a high-risk tool.
- Omit explicit confirmation policy.
- Execute run path that invokes the tool.
- Expected behavior: fail-closed denial until explicit confirmation policy is provided.
- Actual behavior: missing-policy configurations are not uniformly treated as hard safety violations.
Why code change (not docs)
This is a runtime policy gate and contract issue; docs cannot enforce execution constraints.
Scope / Codepaths
src/google/adk/toolssrc/google/adk/agentssrc/google/adk/runners.py
Acceptance Criteria
- High-risk tools require explicit confirmation policy.
- Missing policy causes deterministic fail-closed errors.
- Tests cover sync/async execution surfaces.
Validation Plan
- Add focused fixtures for high-risk tools without policy.
- Verify deterministic deny behavior across run modes.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
tools[Component] This issue is related to tools[Component] This issue is related to tools