Company Details
langchain
187
477,971
513
langchain.com
0
LAN_6814675
In-progress

LangChain Company CyberSecurity Posture
langchain.comLangChain provides the agent engineering platform and open source frameworks developers need to ship reliable agents fast.
Company Details
langchain
187
477,971
513
langchain.com
0
LAN_6814675
In-progress
Between 750 and 799

LangChain Global Score (TPRM)XXXX

Description: Cybersecurity researchers at Noma Security disclosed a critical vulnerability dubbed AgentSmith in LangChain‘s LangSmith platform, specifically affecting its public Prompt Hub. This flaw, with a CVSS score of 8.8, could allow malicious AI agents to steal sensitive user data, including OpenAI API keys, and manipulate responses from large language models (LLMs). The vulnerability exploited harmful proxy configurations, enabling attackers to gain unauthorized access to victims' OpenAI accounts, potentially downloading sensitive datasets, inferring confidential information, or causing financial losses by exhausting API usage quotas. In advanced attacks, the malicious proxy could alter LLM responses, leading to fraud or incorrect automated decisions. LangChain confirmed the issue and deployed a fix, introducing new safety measures to prevent future exploitation.
Description: **Critical ‘LangGrinch’ Vulnerability in LangChain-Core Exposes AI Agent Secrets** A recently disclosed high-severity vulnerability, dubbed **LangGrinch**, affects *langchain-core*—a foundational library powering AI agents in production environments. The flaw, tracked with a **CVSS score of 9.3**, stems from an insecure serialization and deserialization process in the library’s helper functions. Attackers can exploit it via **prompt injection**, tricking AI agents into generating structured outputs containing LangChain’s internal marker key. When improperly escaped during serialization, this data can later be deserialized as a trusted object, enabling malicious actions. The vulnerability resides in *langchain-core* itself, a core dependency for frameworks and applications across the AI ecosystem. With **847 million total downloads** and **tens of millions monthly**, the library is deeply embedded in modern AI workflows. Exploitation could lead to **full environment variable exfiltration**, including cloud credentials, database connection strings, vector database secrets, and LLM API keys—potentially escalating to **remote code execution** under certain conditions. Security researchers at **Cyata** identified **12 distinct exploit flows**, demonstrating how routine agent operations—such as persisting, streaming, or reconstructing structured data—can inadvertently open attack paths. Notably, the flaw lies in the **serialization path**, not deserialization, expanding the attack surface reachable from a single prompt. Cyata emphasized the risk of the vulnerability residing in the ecosystem’s **"plumbing layer,"** making it particularly dangerous for production systems. Patches are available in *langchain-core* **versions 1.2.5 and 0.3.81**, following **ethical disclosure** to LangChain’s maintainers, who implemented remediation and additional security hardening. The discovery underscores the evolving security challenges of **agentic AI**, where governance and permission boundaries become critical as systems move into production.


LangChain has 104.08% more incidents than the average of same-industry companies with at least one recorded incident.
LangChain has 153.16% more incidents than the average of all companies with at least one recorded incident.
LangChain reported 2 incidents this year: 0 cyber attacks, 0 ransomware, 2 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
LangChain cyber incidents detection timeline including parent company and subsidiaries

LangChain provides the agent engineering platform and open source frameworks developers need to ship reliable agents fast.

OYO is a global platform that aims to empower entrepreneurs and small businesses with hotels and homes by providing full-stack technology products and services that aims to increase revenue and ease operations; bringing easy-to-book, affordable, and trusted accommodation to customers around the worl

www.primaryschool.com.au is a directory of sites for students and lesson plans and reference material for teachers and parents. It is currently averaging up to 350,000 unique visitors a month and has over 44,000 subscribers to its free weekly newsletter which showcases the latest internet based reso
At eBay, we create pathways to connect millions of sellers and buyers in more than 190 markets around the world. Our technology empowers our customers, providing everyone the opportunity to grow and thrive — no matter who they are or where they are in the world. And the ripple effect of our work cre

As a leading internet technology company based in China, NetEase, Inc. (NASDAQ: NTES and HKEX:9999, "NetEase") provides premium online services centered around content creation. With extensive offerings across its expanding gaming ecosystem, NetEase develops and operates some of China's most popula

YouTube is a team-oriented, creative workplace where every single employee has a voice in the choices we make and the features we implement. We work together in small teams to design, develop, and roll out key features and products in very short time frames. Which means something you write today cou
Zomato’s mission statement is “better food for more people.” Since our inception in 2010, we have grown tremendously, both in scope and scale - and emerged as India’s most trusted brand during the pandemic, along with being one of the largest hyperlocal delivery networks in the country. Today, Zoma

La etimología de la palabra deriva del término medieval inglés usado para un mercenario (free-independiente o lance-lanza), es decir, un caballero que no servía a ningún señor en concreto y cuyos servicios podían ser alquilados por cualquiera. El término fue acuñado inicialmente por Sir Walter Scot
Cimpress plc (Nasdaq: CMPR) invests in and builds customer-focused, entrepreneurial, mass-customization businesses for the long term. Mass customization is a competitive strategy which seeks to produce goods and services to meet individual customer needs with near mass production efficiency. Cimpr

Türk internet kullanıcılarının en çok tercih ettiği dijital platform olan Mynet, 1999 yılından bugüne liderliğini koruyor. Kendi alanında sayısız ilki gerçekleştiren öncü internet devi Mynet, Türkiye'nin dijital ekosisteminin kalkınmasına ve gelişmesine destek olmayı sürdürüyor. Her ay ortalama 4
.png)
In the fast-evolving world of artificial intelligence development, a newly disclosed vulnerability has sent shockwaves through the community...
An M-Files Server flaw lets authenticated attackers capture session tokens and access documents without authorization.
In the fast-evolving world of artificial intelligence development, frameworks like LangChain have become indispensable tools for building...
A critical LangChain Core vulnerability (CVE-2025-68664, CVSS 9.3) allows secret theft and prompt injection through unsafe serialization;...
A critical security vulnerability in LangChain, enables attackers to extract environment variable secrets and, through a serialization...
A critical vulnerability in LangChain's core library (CVE-2025-68664) allows attackers to exfiltrate sensitive environment variables and...
Critical security patches on December 10, 2025, addressing ten significant vulnerabilities across its Community Edition and Enterprise...
Command injection flaw in the open-source network monitoring tool Cacti allows authenticated attackers to execute arbitrary code.
Black Friday cyber attacks - Cybercriminals are intensifying their efforts during Black Friday 2025, capitalizing on the unprecedented...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of LangChain is http://langchain.com.
According to Rankiteo, LangChain’s AI-generated cybersecurity score is 754, reflecting their Fair security posture.
According to Rankiteo, LangChain currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, LangChain is not certified under SOC 2 Type 1.
According to Rankiteo, LangChain does not hold a SOC 2 Type 2 certification.
According to Rankiteo, LangChain is not listed as GDPR compliant.
According to Rankiteo, LangChain does not currently maintain PCI DSS compliance.
According to Rankiteo, LangChain is not compliant with HIPAA regulations.
According to Rankiteo,LangChain is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
LangChain operates primarily in the Technology, Information and Internet industry.
LangChain employs approximately 187 people worldwide.
LangChain presently has no subsidiaries across any sectors.
LangChain’s official LinkedIn profile has approximately 477,971 followers.
LangChain is classified under the NAICS code 513, which corresponds to Others.
Yes, LangChain has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/langchain.
Yes, LangChain maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/langchain.
As of December 29, 2025, Rankiteo reports that LangChain has experienced 2 cybersecurity incidents.
LangChain has an estimated 13,302 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with noma security, and containment measures with swift deployment of a fix, and remediation measures with new safety measures, remediation measures with warning messages, remediation measures with persistent banner on agent description pages, and third party assistance with cyata (security researchers), and containment measures with patches released in langchain-core versions 1.2.5 and 0.3.81, and remediation measures with security hardening steps beyond the immediate fix, and communication strategy with ethical disclosure to langchain maintainers, public advisory by cyata..
Title: AgentSmith Vulnerability in LangChain's LangSmith Platform
Description: Cybersecurity researchers at Noma Security disclosed a critical vulnerability within LangChain‘s LangSmith platform, affecting its public Prompt Hub. This flaw, dubbed AgentSmith with a CVSS score of 8.8, allows malicious AI agents to steal sensitive user data and manipulate responses from large language models (LLMs).
Date Detected: 2024-10-29
Date Publicly Disclosed: 2024-11-06
Date Resolved: 2024-11-06
Type: Vulnerability Exploit
Attack Vector: Man-in-the-Middle (MITM)
Vulnerability Exploited: Hidden malicious proxy in AI agents
Motivation: Data theftUnauthorized accessFinancial lossFraud
Title: LangGrinch Vulnerability in langchain-core
Description: A critical vulnerability in langchain-core, dubbed 'LangGrinch,' allows attackers to exploit a serialization and deserialization injection vulnerability. This flaw enables the exfiltration of sensitive secrets, including environment variables, cloud provider credentials, and API keys, and could potentially escalate to remote code execution under certain conditions.
Type: Serialization/Deserialization Injection
Attack Vector: Prompt Injection
Vulnerability Exploited: Improper escaping of LangChain’s internal marker key during serialization
Common Attack Types: The most common types of attacks the company has faced is Vulnerability.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Public Prompt Hub.

Data Compromised: Openai api keys, Uploaded files, Voice inputs
Systems Affected: LangSmith's Prompt Hub

Data Compromised: Environment variables, cloud provider credentials, database and RAG connection strings, vector database secrets, LLM API keys
Systems Affected: AI agent frameworks and applications using langchain-core
Operational Impact: Potential full environment variable exfiltration, remote code execution under certain conditions
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Openai Api Keys, Uploaded Files, Voice Inputs, , Environment variables, credentials and API keys.

Entity Name: LangChain
Entity Type: Company
Industry: AI and Technology

Entity Name: LangChain-based AI applications and frameworks
Entity Type: AI Framework/Library
Industry: Artificial Intelligence, Technology
Location: Global
Size: Tens of millions of downloads (847M total downloads of langchain-core)

Third Party Assistance: Noma Security
Containment Measures: Swift deployment of a fix
Remediation Measures: New safety measuresWarning messagesPersistent banner on agent description pages

Third Party Assistance: Cyata (security researchers)
Containment Measures: Patches released in langchain-core versions 1.2.5 and 0.3.81
Remediation Measures: Security hardening steps beyond the immediate fix
Communication Strategy: Ethical disclosure to LangChain Maintainers, public advisory by Cyata
Third-Party Assistance: The company involves third-party assistance in incident response through Noma Security, Cyata (security researchers).

Type of Data Compromised: Openai api keys, Uploaded files, Voice inputs
Sensitivity of Data: High

Type of Data Compromised: Environment variables, credentials, API keys
Sensitivity of Data: High (cloud provider credentials, database secrets, LLM API keys)
Data Exfiltration: Yes (via outbound HTTP requests)
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: New safety measures, Warning messages, Persistent banner on agent description pages, , Security hardening steps beyond the immediate fix.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by swift deployment of a fix and patches released in langchain-core versions 1.2.5 and 0.3.81.

Lessons Learned: Need for organizations to enhance AI security practices, maintain a centralized inventory of AI agents, implement runtime protections, and enforce strong security governance.

Lessons Learned: Agentic AI systems require tight defaults, clear boundaries, and the ability to reduce blast radius. Security must shift from 'what code do we run' to 'what effective permissions does this system end up exercising.'

Recommendations: Maintain a centralized inventory of AI agents using an AI BOM, Implement runtime protections, Enforce strong security governanceMaintain a centralized inventory of AI agents using an AI BOM, Implement runtime protections, Enforce strong security governanceMaintain a centralized inventory of AI agents using an AI BOM, Implement runtime protections, Enforce strong security governance

Recommendations: Update to langchain-core versions 1.2.5 or 0.3.81 immediately. Implement security hardening steps for agentic AI systems.
Key Lessons Learned: The key lessons learned from past incidents are Need for organizations to enhance AI security practices, maintain a centralized inventory of AI agents, implement runtime protections, and enforce strong security governance.Agentic AI systems require tight defaults, clear boundaries, and the ability to reduce blast radius. Security must shift from 'what code do we run' to 'what effective permissions does this system end up exercising.'.
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Update to langchain-core versions 1.2.5 or 0.3.81 immediately. Implement security hardening steps for agentic AI systems..

Source: Noma Security

Source: Hackread.com

Source: SiliconANGLE Media

Source: Cyata
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Noma Security, and Source: Hackread.com, and Source: SiliconANGLE Media, and Source: Cyata.

Investigation Status: Resolved

Investigation Status: Vulnerability patched and publicly disclosed
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Ethical disclosure to LangChain Maintainers and public advisory by Cyata.

Stakeholder Advisories: Urgent update recommended for all organizations using langchain-core
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Urgent update recommended for all organizations using langchain-core.

Entry Point: Public Prompt Hub

Root Causes: Vulnerability in public Prompt Hub allowing malicious proxy configurations
Corrective Actions: Deploying A Fix, Introducing New Safety Measures, Warning Messages, Persistent Banner On Agent Description Pages,

Root Causes: Improper escaping of LangChain’s internal marker key during serialization, allowing untrusted user input to be interpreted as trusted LangChain objects during deserialization.
Corrective Actions: Patches released, security hardening steps implemented, and ethical disclosure process followed.
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Noma Security, Cyata (security researchers).
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Deploying A Fix, Introducing New Safety Measures, Warning Messages, Persistent Banner On Agent Description Pages, , Patches released, security hardening steps implemented, and ethical disclosure process followed..
Most Recent Incident Detected: The most recent incident detected was on 2024-10-29.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-11-06.
Most Recent Incident Resolved: The most recent incident resolved was on 2024-11-06.
Most Significant Data Compromised: The most significant data compromised in an incident were OpenAI API keys, Uploaded files, Voice inputs, , Environment variables, cloud provider credentials, database and RAG connection strings, vector database secrets and LLM API keys.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Noma Security, Cyata (security researchers).
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Swift deployment of a fix and Patches released in langchain-core versions 1.2.5 and 0.3.81.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were OpenAI API keys, Uploaded files, Environment variables, cloud provider credentials, database and RAG connection strings, vector database secrets, LLM API keys and Voice inputs.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Need for organizations to enhance AI security practices, maintain a centralized inventory of AI agents, implement runtime protections, and enforce strong security governance., Agentic AI systems require tight defaults, clear boundaries, and the ability to reduce blast radius. Security must shift from 'what code do we run' to 'what effective permissions does this system end up exercising.'.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Update to langchain-core versions 1.2.5 or 0.3.81 immediately. Implement security hardening steps for agentic AI systems., Maintain a centralized inventory of AI agents using an AI BOM, Enforce strong security governance and Implement runtime protections.
Most Recent Source: The most recent source of information about an incident are Hackread.com, Cyata, Noma Security and SiliconANGLE Media.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Resolved.
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Urgent update recommended for all organizations using langchain-core, .
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Public Prompt Hub.
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Vulnerability in public Prompt Hub allowing malicious proxy configurations, Improper escaping of LangChain’s internal marker key during serialization, allowing untrusted user input to be interpreted as trusted LangChain objects during deserialization..
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Deploying a fixIntroducing new safety measuresWarning messagesPersistent banner on agent description pages, Patches released, security hardening steps implemented, and ethical disclosure process followed..
.png)
A vulnerability was found in Tenda WH450 1.0.0.18. Affected is an unknown function of the file /goform/PPTPUserSetting. Performing manipulation of the argument delno results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used.
A vulnerability has been found in Tenda WH450 1.0.0.18. This impacts an unknown function of the file /goform/PPTPServer. Such manipulation of the argument ip1 leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
A flaw has been found in omec-project UPF up to 2.1.3-dev. This affects the function handleSessionEstablishmentRequest of the file /pfcpiface/pfcpiface/messages_session.go of the component PFCP Session Establishment Request Handler. This manipulation causes null pointer dereference. The attack may be initiated remotely. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability was detected in floooh sokol up to 16cbcc864012898793cd2bc57f802499a264ea40. The impacted element is the function _sg_pipeline_desc_defaults in the library sokol_gfx.h. The manipulation results in stack-based buffer overflow. The attack requires a local approach. The exploit is now public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is identified as 5d11344150973f15e16d3ec4ee7550a73fb995e0. It is advisable to implement a patch to correct this issue.
A security vulnerability has been detected in PbootCMS up to 3.2.12. The affected element is the function get_user_ip of the file core/function/handle.php of the component Header Handler. The manipulation of the argument X-Forwarded-For leads to use of less trusted source. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.