bx-ai-tools
Warn
Audited by Gen Agent Trust Hub on Apr 26, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The
calctool example in theUsing Tools with aiChat()section uses theevaluate(expr)function whereexpris a string provided by the AI. In BoxLang and similar environments,evaluate()is not restricted to mathematical operations and can execute arbitrary code, creating a path for an attacker to run system commands if the AI is manipulated via prompt injection.- [REMOTE_CODE_EXECUTION]: By recommending the use ofevaluate()on external strings (AI tool arguments), the documentation promotes an unsafe pattern where code generation and execution are performed on untrusted input.- [DATA_EXFILTRATION]: The skill includes examples for tools likeget_usersandsend_email. While these are legitimate use cases for administrative agents, they represent a significant attack surface for data exposure or exfiltration if the agent's instructions are bypassed.
Audit Metadata