model-serving
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- REMOTE_CODE_EXECUTION (CRITICAL): The
calculatefunction inexamples/langchain-agents/main.pyuses the Pythoneval()function on theexpressioninput provided by the AI agent. Since the agent's input is derived directly from user queries (found in therun_agentfunction and interactiveinput()loop), an attacker can use prompt injection to execute arbitrary Python code on the host system. - EXTERNAL_DOWNLOADS (CRITICAL): The
examples/ollama-local/README.mdfile instructs users to execute a remote script usingcurl -fsSL https://ollama.com/install.sh | sh. Piped execution of remote scripts from non-trusted domains (ollama.com is not in the [TRUST-SCOPE-RULE] list) is a high-risk pattern for supply-chain attacks. - COMMAND_EXECUTION (HIGH): Indirect Prompt Injection Surface (Category 8) detected in
examples/langchain-agents/main.py. - Ingestion points: User-provided
queryinrun_agentand interactiveinput()loop. - Boundary markers: None identified; user input is passed directly to the
AgentExecutor. - Capability inventory: Full Python execution via
eval()in theCalculatortool. - Sanitization: None; the agent is trusted to provide valid math expressions, which can be bypassed via adversarial prompting.
- PROMPT_INJECTION (MEDIUM): The FastAPI implementation in
examples/vllm-serving/main.pyusesCORSMiddlewarewithallow_origins=["*"]. While common in examples, this configuration allows any domain to interact with the API, increasing the surface for cross-site attacks and unauthorized data access if deployed in a production environment. - REMOTE_CODE_EXECUTION (MEDIUM): Use of
langchainhub.pull("hwchase17/react")inexamples/langchain-agents/main.pydynamically downloads agent prompts from a remote repository at runtime. While the source is known, this introduces a dependency on the integrity of the external hub content.
Recommendations
- AI detected serious security threats
Audit Metadata