#Langflow

2025-06-09

LangWHAT?
You've seen names like LangChain, LangGraph, LangFlow or LangSmith – but what’s really behind them?

:blobcoffee: LangChain helps us build LLM apps via modular code.

:blobcoffee: LangGraph adds branching logic and multi-agent workflows.

:blobcoffee: LangFlow lets us create flows with drag & drop.

:blobcoffee: LangSmith monitors and evaluates our LLM stack.

LangChain, LangGraph and LangSmith come from the same ecosystem. LangFlow is a visual builder developed independently by DataStax.

Tried both LangChain and Langflow to build the same chatbot — Medium article coming shortly.

#LangChain #LangFlow #LLM #AI #KI #python #OpenSource #LangGraph #LangSmith #technology #chatbot #ollama

2025-06-02

🧠 Confused between LangGraph and LangFlow?

🔸 LangGraph is a code-first framework from the LangChain team. Perfect for building stateful, multi-agent, complex LLM workflows with branching, loops, and control logic.

🔸 LangFlow is a visual builder made by a third party. Great for drag-and-drop prototyping of LangChain apps—no deep coding needed.

✅ Use LangGraph for logic-heavy orchestration.
✅ Use LangFlow to experiment and visualize quickly.

#LangChain #LLMs #AItools #LangGraph #LangFlow

2025-06-02

🚨 CVE-2025-3248: Renewed Interest in Langflow Remote Code Execution

ℹ️ About the exploit:
#Langflow is a widely used #opensource library for building AI agents, backed by corporate support from #Datastax (now #IBM). The tool provides a web-based, drag-and-drop interface for creating agentic workflows, making it particularly attractive to businesses, but also a high-value target for exploits. Given that such workflows often integrate with critical business databases and tools, security vulnerabilities in Langflow could have severe consequences.

This risk is not hypothetical. Langchain, another leading AI framework, has already been associated with over 30 CVEs, underscoring the security challenges in the fast-moving LLM development ecosystem.

The vulnerability in Langflow allowed unauthenticated attackers to execute arbitrary code on the host machine. Discovered and disclosed by Horizon3 in late February, the issue was patched in version 1.3, released at the end of March. Below is a detailed timeline of the discovery and remediation process.

🔎 Trend analysis:
🔹 Feb 25, 2025: The vulnerability is disclosed to DataStax by Horizon3.
🔹 Mar 5, 2025: DataStax fixes the vulnerability in the development branch.
🔹 Mar 31, 2025: Langflow 1.3.0 releases, containing a fix for CVE-2025-3248.
🔹 April 7, 2025: CVE-2025-3248 is published to the NVD.
🔹 April 9, 2025: The exploit is leaked to the public, and the CrowdSec Network starts tracking the exploit.
🔹 April 11-12, 2025: The CrowdSec Network observes a first wave of exploitation attempts by approximately 200 machines.
🔹 April 12 - May 14, 2025: Attackers disappear, with barely any attacks registered in the CrowdSec Network.
🔹 May 14 - 23, 2025: The CrowdSec Network observes a renewed, smaller wave of attacks, peaking out at around 100 involved machines.

✅ How to protect your systems:
🔹Patch: If you haven’t already, ensure your publicly exposed Langflow instance is updated with the latest patch.
🔹Preemptive blocking: Use Crowdsec CTI to block IPs exploiting CVE-2025-3248 👉 app.crowdsec.net/cti?q=cves%3A
🔹Stay proactive: Install the Crowdsec Web Application Firewall to stay ahead of exploit attempts with 100+ virtual patching rules available 👉 app.crowdsec.net/cti?q=cves%3A

Sharing insights and taking swift action can collectively reduce the impact of these threats. This is your call to action for real-time threat intelligence and #collaborative #cybersecurity 👉 crowdsec.net/

2025-05-07

Urgent: Critical Langflow vulnerability (CVE-2025-3248) allows remote code execution; patch coming May 26. #Langflow #CVE20253248 #Cybersecurity

More details: talkback.sh/resource/49fd7521- - flagthis.com/news/14515

2025-05-07

Critical Langflow vulnerability (CVE-2025-3248) allows remote code execution; immediate patching urged by CISA. #Langflow #Cybersecurity #CISA

More details: securityaffairs.com/177481/hac - flagthis.com/news/14562

2025-05-07

🚨 #CISA warns CVE-2025-3248 in Langflow is being actively exploited. Critical RCE flaw allows full server takeover. Patch to v1.3.0 ASAP.

#Infosec #CVE2025 #Langflow #CyberSecurity

Read: hackread.com/langflow-vulnerab

Teddy / Domingo (🇨🇵/🇬🇧)TeddyTheBest@framapiaf.org
2025-05-07

'Easily Exploitable' #Langflow #Vulnerability Requires Immediate Patching. The vulnerability, which has a CVSS score of 9.8, is under attack and allows threat actors to remotely execute arbitrary commands on servers running the agentic #AI builder.
darkreading.com/vulnerabilitie
#security

2025-05-06

Langflow's critical flaw lets attackers run arbitrary code on AI systems—could your setup be at risk? Learn what happened and how to stay secure.

thedefendopsdiaries.com/unders

#langflow
#rce
#cve20253248
#cybersecurity
#opensource

2025-04-06

Сравнение low-code редакторов для разработки приложений на основе LLM

Привет, Habr! Наша команда LLM-разработки подготовила статью с анализом low-code редакторов для разработки пайплайнов на базе LLM-моделей. Тема сравнения редакторов назревала давно, так как мы активно используем данные инструменты в своей работе и зачастую сталкиваемся с различными ограничениями решений. Данная статья будет полезна командам, которые только выбирают среду разработки пайплайнов для своих LLM-приложений и ИИ-агентов, а также тем, кто ищет лучший редактор для решения своих задач. Введение В эпоху стремительного развития технологий, когда скорость вывода продуктов на рынок становится ключевым фактором успеха (TTM), традиционные методы разработки программного обеспечения сталкиваются с новыми вызовами. Одним из наиболее перспективных решений является использование low-code платформ — инструментов, позволяющих создавать приложения с минимальным количеством написания кода вручную. Особенно интересными становятся low-code редакторы, интегрированные с большими языковыми моделями (LLM),которые позволяют автоматизировать разработку и повысить эффективность работы разработчиков. Цель данной статьи — провести сравнительный анализ четырех популярных low-code редакторов: Flowise, LangFlow, n8n и Dify. Эти платформы предоставляют различные подходы к созданию приложений на основе LLM, каждая из которых имеет свои уникальные особенности и преимущества. 1. Описание приложений на основе LLM (основные виды, обзор рынка) Приложения на основе больших языковых моделей (LLM) представляют собой относительно новый класс программного обеспечения, которое способно решать множество задач благодаря использованию мощных алгоритмов машинного обучения. В контексте low-code редакторов, LLM играют ключевую роль в автоматизации процессов разработки, позволяя создавать функциональные приложения с минимальными затратами времени и усилий.

habr.com/ru/articles/898062/

#ииагенты #lowcode #n8n #flowise #llmприложения #llmмодели #llm #llmархитектура #langflow #Dify

2024-11-15
2023-05-07

LangFlow, the new graphical user interface for #langchain, proves two things:

1- As soon as anything becomes complex, modeling comes to the rescue.

2- Our modeling expertise could (and should) benefit many other communities. We can for sure help them to build better modeling languages and tools.

(this all goes in line with our proposal "Modeling should be an independent scientific discipline" link.springer.com/article/10.1 )

#gui #langflow #langchain #modeling #DSL #openaccess

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst