langchain4j-spring-boot-integration
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS] (HIGH): Automated security scans identified
langchain4j.open-ai.chas a malicious or blacklisted domain. This domain appears to be a typosquatting attempt targeting the LangChain4j ecosystem, likely intended to host malicious artifacts or intercept API traffic.\n- [REMOTE_CODE_EXECUTION] (HIGH): The documentation explicitly instructs users to include version1.8.0fordev.langchain4jdependencies. However, legitimate versions of these libraries are currently in the0.x.xrange. This mismatch indicates a dependency confusion attack, where a malicious high-versioned package is published to a public registry to override official internal or lower-versioned dependencies during the build process.\n- [COMMAND_EXECUTION] (MEDIUM): The skill's metadata grants the agent high-privilege tool access, includingBash,Write, andEdit. These permissions enable the agent to execute build commands (e.g., Maven or Gradle) that would trigger the download and execution of the suspicious dependencies mentioned in the documentation, potentially leading to a full system compromise.
Recommendations
- AI detected serious security threats
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata