langfuse
Pass
Audited by Gen Agent Trust Hub on May 6, 2026
Risk Level: SAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection vulnerabilities. It ingests data from Langfuse traces and observations which contain untrusted inputs and outputs from external user interactions. An attacker could embed malicious instructions in these traces that the agent might follow when retrieving them.
- Ingestion points: The
fetch_trace,fetch_observation, andget_exception_detailstools inreferences/tool-reference.mdread data from the external Langfuse platform. - Boundary markers: Absent. There are no instructions or delimiters provided to ensure the agent treats retrieved trace content as data rather than instructions.
- Capability inventory: The skill has the ability to modify production-level assets through
create_text_prompt,update_prompt_labels, andcreate_dataset_itemas described inSKILL.md. - Sanitization: Absent. Content retrieved from external traces is interpolated directly into the agent's context without filtering.
- [EXTERNAL_DOWNLOADS]: The setup instructions in
SKILL.mdandreferences/setup.mddirect the user to download and execute thelangfuse-mcppackage from the PyPI registry using theuvxtool. While PyPI is a standard registry, this involves the execution of third-party code. - [COMMAND_EXECUTION]: The skill requires the user to execute shell commands to configure the MCP environment, which includes setting sensitive environment variables (
LANGFUSE_SECRET_KEY) and defining the runtime arguments for the server.
Audit Metadata