langchain-use
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
- [COMMAND_EXECUTION] (HIGH): Use of
eval()for tool logic. - Evidence: In
references/tools/tool-basics.md, a calculator tool is defined usingreturn str(eval(expression)). This is a classic Arbitrary Code Execution (ACE) vulnerability, as a model could be manipulated to execute malicious Python commands. - [REMOTE_CODE_EXECUTION] (MEDIUM): Execution of local scripts via MCP.
- Evidence: In
references/advanced/mcp.md, the documentation demonstrates configuring theMultiServerMCPClientto execute local Python files (e.g.,/path/to/math_server.py) using thestdiotransport mechanism. - [CREDENTIALS_UNSAFE] (LOW): Hardcoded default database credentials.
- Evidence: Files
SKILL.mdandreferences/memory/short-term-memory.mdcontain connection strings with default credentials (postgres:postgres@localhost). While common in documentation, these represent unsafe credential patterns. - [EXTERNAL_DOWNLOADS] (SAFE): Installation of trusted packages.
- Evidence: The skill recommends installing
langchain,langchain-anthropic, andlanggraph-checkpoint-postgres, which are from trusted organizations.
Recommendations
- AI detected serious security threats
Audit Metadata