The Dumbest AI Security Flaw
Автор: CyberFlow
Загружено: 17 мая 2025 г.
Просмотров: 40 657 просмотров
Join up and get everything you actually need to start hacking like a pro 🎓💻✨https://cyberflow-academy.github.io/
Educational Purposes Only.
langflow — a low-code platform for building AI agents — accidentally allowed anyone to run arbitrary Python code on their servers through a “/APIV1/validate-code” endpoint. This wasn't just a theoretical bug. This was active Remote Code Execution (RCE), exploited in the wild, and flagged by CISA. The cause? langflow tried to validate user-submitted code… by executing it. Including Python decorators, which get triggered immediately. If you’re building anything AI-powered and letting users submit code — even for validation — sandbox it like your life depends on it.
In this video, we break down exactly how Horizon3.ai found the vuln, how the attack worked through AST parsing quirks, and why trusting AI blindly is a fast track to getting pwned. Whether you’re a dev, hacker, or just love watching million-dollar startups get humbled, this one’s for you.
#ai #cybersecurity #remotecodeexecution #python #hacking #langflow #startups #infosec #technews #ethicalhacking #rce #exploit #ast #lowcode #openai #developers #devsecops #bugbounty #malware #programming
https://horizon3.ai/attack-research/d...
https://github.com/langflow-ai/langfl...
→ Email: [email protected]
I believe in you. You can do it. 🖤
======================
.▀█▀.█▄█.█▀█.█▄.█.█▄▀ █▄█.█▀█.█─█
─.█.─█▀█.█▀█.█.▀█.█▀▄ ─█.─█▄█.█▄█

Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: