skills/giuseppe-trisciuoglio/developer-kit-claude-code/langchain4j-tool-function-calling-patterns/Gen Agent Trust Hub
langchain4j-tool-function-calling-patterns
Pass
Audited by Gen Agent Trust Hub on Apr 1, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [DATA_EXFILTRATION]: The skill documents patterns for building tools that access potentially sensitive information from databases and external REST APIs. While presented as functional examples, these patterns represent a data exposure surface if implemented without rigorous authorization.\n
- Evidence:
references/examples.mdandreferences/implementation-patterns.mdcontain examples of database lookup tools (getUserById) and API integration tools (getStockPrice).\n- [COMMAND_EXECUTION]: The instructions describe how to implement tools that execute database commands or complex logic. The documentation explicitly includes a pattern for a tool that accepts and executes raw SQL queries from the LLM, which is a high-privilege capability.\n - Evidence: The
DatabaseServiceexample inreferences/examples.mdincludes anExecute read query on databasetool that takes a raw string as a SQL query.\n- [PROMPT_INJECTION]: (Indirect Prompt Injection Surface) The skill defines a large attack surface for indirect prompt injection by demonstrating how to build tools that process data originating from LLM responses.\n - Ingestion points: Parameters of methods annotated with
@Tool(e.g., thelocationparameter inWeatherServiceor thequeryparameter inDatabaseService) acrossSKILL.mdand the reference documentation.\n - Boundary markers: The examples lack explicit boundary markers or delimiters to isolate user-controlled data within the tool logic, although the documentation provides general advice on input sanitization.\n
- Capability inventory: Patterns include tools for database manipulation (
updateEmail), access to sensitive data (getSensitiveData), and external web requests viaWebClient.\n - Sanitization: The skill recommends input sanitization in its security considerations and provides basic validation examples, such as checking that SQL queries start with the 'SELECT' keyword.
Audit Metadata