skills/l-yifan/skills/langchain/Gen Agent Trust Hub

langchain

Fail

Audited by Gen Agent Trust Hub on Mar 14, 2026

Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [REMOTE_CODE_EXECUTION]: The calculator tool implemented in SKILL.md and references/agents.md uses the eval() function on input strings. This allows for the execution of arbitrary Python code and is a major security risk if input is untrusted.\n- [COMMAND_EXECUTION]: The references/integration.md file demonstrates the ShellTool, which enables an agent to run arbitrary commands directly in the system shell.\n- [REMOTE_CODE_EXECUTION]: The PythonREPLTool shown in references/integration.md allows the agent to execute arbitrary Python scripts in a REPL environment.\n- [REMOTE_CODE_EXECUTION]: The FAISS vector store loading example in references/integration.md explicitly uses allow_dangerous_deserialization=True, enabling potential code execution via malicious pickle files.\n- [PROMPT_INJECTION]: The risky_api_call tool in references/agents.md accepts a user-provided URL endpoint, creating an attack surface for Indirect Prompt Injection and Server-Side Request Forgery (SSRF) attacks.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Mar 14, 2026, 08:29 AM