Scan an LLM Application
Paste a repository URL or upload a project folder. Sentinel will map all components, detect CVEs, and run automated pen testing.
Drag & drop your project folder, or browse
Scan History
48 totalCVE Findings
Sorted by severity| CVE ID | Component | Severity | CVSS | Status |
|---|---|---|---|---|
| CVE-2024-3095 | langchain-core 0.1.5 | Critical | 9.1 | Unpatched |
| ⬛ PROP-0047 | llama-index 0.9.2 | Critical | 8.8 | No public PoC |
| CVE-2024-1876 | transformers 4.36.0 | High | 7.5 | Patch available |
| CVE-2023-9182 | openai 1.6.1 | High | 7.2 | Patch available |
| ⬛ PROP-0031 | faiss-cpu 1.7.4 | Medium | 5.1 | No public PoC |
Component Risk
Top contributorsPen Test Summary
Architecture Details
Dependency Tree
312 componentsCVE Library
2,847 entries| CVE ID | Component | Type | Severity | CVSS | Source | Added |
|---|---|---|---|---|---|---|
| ⬛ PROP-0047 | llama-index 0.9.x | Prompt Injection | Critical | 8.8 | Proprietary | 2 Apr 2026 |
| CVE-2024-3095 | langchain-core 0.1.x | Code Exec | Critical | 9.1 | NVD | Mar 2024 |
| ⬛ PROP-0031 | faiss-cpu 1.7.x | Memory Corruption | Medium | 5.1 | Proprietary | 28 Mar 2026 |
| CVE-2024-1876 | transformers 4.36.x | Deserialization | High | 7.5 | NVD | Jan 2024 |
| ⬛ PROP-0019 | langchain-community | Tool Injection | High | 7.0 | Proprietary | 15 Mar 2026 |
| CVE-2023-9182 | openai 1.6.x | Auth Bypass | High | 7.2 | NVD | Dec 2023 |
Overall Score
Insurance Input
| Component | Version | CVE Count | Dep. Depth | Has Exploit | Patched | Score |
|---|---|---|---|---|---|---|
| langchain-core | 0.1.5 | 4 | 3 | Yes | No | 95 |
| llama-index | 0.9.2 | 2 | 2 | Partial | No | 82 |
| transformers | 4.36.0 | 2 | 4 | No | Yes | 75 |
| openai | 1.6.1 | 1 | 2 | No | Yes | 60 |
| faiss-cpu | 1.7.4 | 1 | 1 | Partial | No | 45 |
API Keys
Map Sentinel severity levels to your organisation's internal classification. Exported reports will use your labels.
- ApplicationLangflow Workflow Platform v1.2.0
- FrameworkReact + Uvicorn (Python)
- Server43.156.238.180:7860
- Key Endpoints/login · /api/v1/validate/code · /flow
- Scan ModeNon-lateral · Zero collateral impact
| CVE ID | Component | Type | Severity | Status |
|---|---|---|---|---|
| CVE-2025-3248 | Langflow Core | Unauthenticated RCE | Critical | Exploited ✓ |
| CVE-2025-57760 | Langflow CLI | Privilege Escalation | High | Exploited ✓ |
| CVE-2025-68155 | React | XSS | High | Failed — patched |
🔍 Initial Reconnaissance
- System detected: Langflow Workflow Platform v1.2.0
- Live API discovered:
/api/v1/validate/code - Auth endpoint:
/login(JWT-based)
🎯 Exploit 1 — Privilege Escalation via CVE-2025-57760
A privilege escalation vulnerability in Langflow containers allows an authenticated user with RCE access to invoke the internal CLI to create a new superuser. This bypasses the UI registration flow, granting full admin access.
🚀 Exploit 2 — Unauthenticated RCE via CVE-2025-3248
A remote, unauthenticated attacker can send crafted HTTP requests to the code validation endpoint to execute arbitrary system commands — without any login required.
✅ Finding
CVE-2025-57760 enables remote attackers to create a new administrative user via internal CLI abuse. CVE-2025-3248 enables remote, unauthenticated attackers to execute arbitrary system commands including root-level account modifications.
🚨 Impact
Full system compromise achieved. Attacker obtained administrator privileges in the application and root shell access via unauthenticated remote command injection. All data on the host is at risk.
🛠️ Recommendations
- ↑ Upgrade Langflow to a patched version immediately
- 🔒 Restrict access to
/api/v1/validate/code— require auth + IP allowlist - 🛡️ Introduce strict input sandboxing / code execution isolation
- 🔑 Deploy API authentication and rate-limiting on all endpoints
- 📊 Conduct continuous security regression testing with Sentinel