langgraph-tools

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 0.90). Mostly documentation and examples, but it includes a direct use of eval on untrusted input (eval(expression)) which enables remote code execution and is a critical security vulnerability; destructive operations (delete/transfer) are present but often wrapped with approval gates, and there are no clear signs of data exfiltration or credential theft.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill includes tool implementations that fetch arbitrary external web content—most clearly api_call_with_retry which calls requests.get(endpoint) (and examples like search_web/search_api.search)—and those results are returned into the agent's tool-call workflow for the model to read and interpret, exposing it to untrusted third-party content.

MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).

  • Direct money access detected (high risk: 1.00). The skill prompt includes an explicit tool named transfer_funds with signature transfer_funds(from_account: str, to_account: str, amount: float) that calls execute_transfer(from_account, to_account, amount) to move money (with optional approval via interrupt for large amounts). This is a specific, money-moving function (direct transaction execution), not a generic tool, so it meets the "Direct Financial Execution" criteria.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 16, 2026, 12:38 AM