langgraph-tutor
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION] (HIGH): The validation script
scripts/validate_graph.pyusesimportlib.utilto execute the code within a target file under the guise of validation. This allows for arbitrary code execution if an agent is directed to validate a malicious script. - [REMOTE_CODE_EXECUTION] (HIGH): Reference documentation in
references/patterns.mdandreferences/tools.mdprovides code snippets for acalculatortool that uses theeval()function on raw input. This pattern is highly susceptible to shell injection if adopted by an agent or user. - [COMMAND_EXECUTION] (MEDIUM): The
SKILL.mdmetadata grants broadBashpermissions forpythonandpipoperations, which enables arbitrary package installation and script execution at runtime. - [INDIRECT_PROMPT_INJECTION] (MEDIUM): The skill is designed to process and execute agent workflows which are often defined in external files. There are no boundary markers or explicit sanitization logic to prevent an agent from following instructions embedded in a 'graph' file it is told to read or validate.
Recommendations
- AI detected serious security threats
Audit Metadata