GHSA-2763-cj5r-c79m: PraisonAI Vulnerable to OS Command Injection
(updated )
The execute_command function and workflow shell execution are exposed to user-controlled input via agent workflows, YAML definitions, and LLM-generated tool calls, allowing attackers to inject arbitrary shell commands through shell metacharacters.
References
Code Behaviors & Features
Detect and mitigate GHSA-2763-cj5r-c79m with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →