langflow-exploit

Fail

Audited by Socket on Apr 22, 2026

2 alerts found:

Malwarex2
MalwareHIGH
SKILL.md

MALICIOUS. This skill’s stated purpose is to exploit LangFlow instances using unauthorized access, brute force, and code injection to achieve RCE. Its capabilities are fundamentally offensive, disproportionate, and incompatible with a benign AI agent skill, even though dependency installation itself is low-risk and direct-to-official endpoints.

Confidence: 98%Severity: 99%
MalwareHIGH
references/exploit-details.md

This fragment documents highly malicious exploit tooling for LangFlow: it describes unauthorized JWT acquisition or default/weak credential brute forcing, creating public flows, and triggering server-side code execution via the build endpoint using injected component code. It further includes command execution output exfiltration and optional reverse shell callbacks. While the actual Python source is not provided here, the described end-to-end behavior is explicitly exploit/RCE-focused and would represent a severe supply-chain security risk if present in a package.

Confidence: 70%Severity: 88%
Audit Metadata
Analyzed At
Apr 22, 2026, 08:00 AM
Package URL
pkg:socket/skills-sh/wgpsec%2FAboutSecurity%2Flangflow-exploit%2F@93e79d84a097b89d5aa4045a0ce4cecc5d3f7921