agentic-radar
by splx-ai
Overview
A legal support chatbot capable of web search, employee database queries, JIRA interaction, and generating/retrieving supplier liability documents for companies.
Installation
docker run -p 8000:8000 -p 8501:8501 -v ./input_files:/app/input_files -v ./output_files:/app/output_files legal-agentEnvironment Variables
- LANGCHAIN_TRACING_V2
- LANGCHAIN_API_KEY
- LANGCHAIN_PROJECT
- PINECONE_API_KEY
- AZURE_OPENAI_API_KEY
- AZURE_OPENAI_ENDPOINT
- JIRA_API_TOKEN
- JIRA_USERNAME
- JIRA_CLOUD
- JIRA_INSTANCE_URL
- AWS_ACCESS_KEY_ID
- AWS_REGION
- AWS_SECRET_ACCESS_KEY
- TAVILY_API_KEY
- JIRA_project_key
Security Notes
CRITICAL VULNERABILITIES DETECTED: - Arbitrary Code Execution (ACE) via `eval()`: The `calculate` tool in `examples/openai-agents/mcp/multiple_servers_in_async_with/multiple_servers_in_async_with.py` directly uses `eval(expression)`, which is a severe vulnerability. If user input can reach this function, an attacker can execute arbitrary code on the host system. - Unrestricted External Command Execution: Examples utilize `MCPServerStdio` with `npx` or `uvx` to run external MCP servers (e.g., `@modelcontextprotocol/server-filesystem`, `mcp-server-git`). This introduces significant risks, as it allows the execution of unverified or potentially malicious external packages, especially if arguments can be manipulated by an attacker. - Potential Server-Side Request Forgery (SSRF): In `examples/openai-agents/mcp/sse_example/server.py`, `requests.get(f"{endpoint}/{city}")` is used, where `city` is derived from LLM input. While `wttr.in` is benign, this pattern could be exploited for SSRF if the target URL or input is manipulated to access internal network resources. - JSON Parsing Risks: `json.loads` is used in several places (e.g., `examples/langgraph/Gladiator2/nodes/researcher.py`, `examples/langgraph/Gladiator2/Tools/create_tools.py`). Although safer than `eval`, improper error handling for malformed JSON from untrusted sources could lead to denial of service. - Data Handling: The system processes sensitive employee data and supplier liability contracts. While `PIIProtectionStep` is noted for prompt hardening, comprehensive, system-level access control and sanitization are essential to prevent sensitive information disclosure across all data interactions.
Similar Servers
mcp-server-atlassian-jira
Connects AI assistants to Atlassian Jira projects, issues, and workflows for natural language interaction, project insights, and streamlined issue management.
ayunis-legal-mcp
Semantic search and retrieval of German legal texts for AI assistants.
CanadaGPT
Provides a comprehensive API for Canadian federal parliamentary and legal information, serving as a data backend for an AI chat system.
mcp-rag-agent
A RAG-based chatbot that provides grounded answers to company policy questions by performing semantic search on an internal document corpus stored in a vector database.