langchain-components
Fail
Audited by Gen Agent Trust Hub on Mar 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill documentation describes mechanisms that enable arbitrary shell command execution.
references/deep-agents.mdidentifies anexecutetool designed to run shell commands within sandbox backends.references/middleware.mddetails theShellToolMiddleware, specifically highlighting theHostExecutionPolicywhich provides "Full host access."SKILL.mdexplicitly includesBashin itsallowed-toolsmetadata, granting the agent direct terminal access.- [REMOTE_CODE_EXECUTION]: The reference material includes unsafe programming practices that facilitate code injection.
references/tools.mdprovides a Python code snippet for a calculator tool using theeval()function:@tool("calculator") def calc(expression: str): return str(eval(expression)). Since theexpressionis generated by the AI agent (and potentially influenced by user input), this pattern allows for arbitrary Python code execution.- [EXTERNAL_DOWNLOADS]: The skill references the installation of numerous external dependencies.
SKILL.mdand multiple reference files (e.g.,references/agents.md,references/deep-agents.md) includepip installcommands for libraries such aslangchain,langgraph, anddeepagents. These are recognized as well-known services and trusted packages within the AI development community.- [DATA_EXFILTRATION]: The skill documents an extensive attack surface for indirect prompt injection through its retrieval components.
- Ingestion points:
references/retrieval.mddescribes the use ofWebBaseLoaderandPyPDFLoaderto ingest data from external websites and documents into the agent's context. - Boundary markers:
references/agents.mdprovides examples ofContentFilterMiddlewareand PII detection to mitigate risks, though these are presented as optional configurations. - Capability inventory: The documentation across
references/middleware.mdandSKILL.mdconfirms that the agent may have access toBashand other shell execution tools, which could be exploited to exfiltrate data if an attacker successfully injects malicious instructions into the ingested content. - Sanitization:
references/middleware.mddescribes strategies for redacting or masking sensitive information usingPIIDetectionMiddleware.
Recommendations
- AI detected serious security threats
Audit Metadata