RTX AI Garage: Lokale KI-Workflows mit Langflow und Ollama auf NVIDIA RTX-PCs
Die aktuelle Ausgabe der RTX AI Garage erläutert, wie Anwender mit der visuellen Plattform Langflow und der Ollama-Integration komplexe, generative KI-Workflows auf
https://xboxdev.com/rtx-ai-garage-lokale-ki-workflows-mit-langflow-und-ollama-auf-nvidia-rtx-pcs/
#Entwicklung #GenerativeKI #Langflow #LokaleKIWorkflows #ModelContextProtocol #NVIDIAGeForceRTX #Ollama #ProjectGAssist #RTXAIGarage #RTXPRO #RTXRemix

ハニーポット観測:LLMアプリケーションの構築フレームワーク(Langflow)を標的とする攻撃の観測状況
https://qiita.com/melymmt/items/0cec12f43189ab79564c?utm_campaign=popular_items&utm_medium=feed&utm_source=popular_items

#qiita #Security #honeypot #LLM #langflow

ハニーポット観測:LLMアプリケーションの構築フレームワーク(Langflow)を標的とする攻撃の観測状況 - Qiita

はじめに 三菱電機の山元です。 三菱電機 情報技術総合研究所で運用しているハニーポットではLLM(Large Language Model)アプリケーションの構築フレームワーク(Langflow)に存在する脆弱性を標的とすると見られる攻撃を観測しました。 昨今のAIブーム...

Qiita

I published a walk-through video about building an AI Agent using #ApacheCamel, #LangFlow and the Wanaku #MCP Router

https://www.youtube.com/watch?v=fIoE-dS8AAQ

Build an Expert AI Agent for Apache Camel with LangFlow & Wanaku MCP Router

YouTube

I am testing #langflow

https://docs.langflow.org/get-started-installation#install-and-run-langflow-docker

This looks promising. #n8n uses a JavaScript runtime. I don't want to write JavaScript outside the frontend.

Install Langflow | Langflow Documentation

Langflow can be installed in multiple ways:

News Flodrix botnet targets vulnerable Langflow servers

Attackers exploit CVE-2025-3248 in Langflow servers to deliver Flodrix botnet via downloader scripts, Trend Research reports.

Security Affairs
News Flodrix botnet targets vulnerable Langflow servers

Attackers exploit CVE-2025-3248 in Langflow servers to deliver Flodrix botnet via downloader scripts, Trend Research reports.

Security Affairs
📢 Vulnérabilité critique de Langflow exploitée pour déployer le botnet Flodrix
📝 Cet article de Trend™ Research met en lumière une **campagne active** exploitant la vulnérabilité **CVE-2025-3248** dans les vers...
📖 cyberveille : https://cyberveille.ch/posts/2025-06-18-vulnerabilite-critique-de-langflow-exploitee-pour-deployer-le-botnet-flodrix/
🌐 source : https://www.trendmicro.com/en_us/research/25/f/langflow-vulnerability-flodric-botnet.html
#Flodrix #Langflow #Cyberveille
Vulnérabilité critique de Langflow exploitée pour déployer le botnet Flodrix

Cet article de Trend™ Research met en lumière une campagne active exploitant la vulnérabilité CVE-2025-3248 dans les versions antérieures à 1.3.0 de Langflow, un cadre visuel Python pour la création d’applications d’IA. La vulnérabilité, avec un score CVSS de 9.8, permet une exécution de code à distance non authentifiée via des requêtes POST malveillantes au point de terminaison /api/v1/validate/code. Les attaquants utilisent cette faille pour exécuter des scripts téléchargeurs, installant ainsi le malware Flodrix sur les serveurs compromis.

CyberVeille

LangWHAT?
You've seen names like LangChain, LangGraph, LangFlow or LangSmith – but what’s really behind them?

 LangChain helps us build LLM apps via modular code.

 LangGraph adds branching logic and multi-agent workflows.

 LangFlow lets us create flows with drag & drop.

 LangSmith monitors and evaluates our LLM stack.

LangChain, LangGraph and LangSmith come from the same ecosystem. LangFlow is a visual builder developed independently by DataStax.

Tried both LangChain and Langflow to build the same chatbot — Medium article coming shortly.

#LangChain #LangFlow #LLM #AI #KI #python #OpenSource #LangGraph #LangSmith #technology #chatbot #ollama

🧠 Confused between LangGraph and LangFlow?

🔸 LangGraph is a code-first framework from the LangChain team. Perfect for building stateful, multi-agent, complex LLM workflows with branching, loops, and control logic.

🔸 LangFlow is a visual builder made by a third party. Great for drag-and-drop prototyping of LangChain apps—no deep coding needed.

✅ Use LangGraph for logic-heavy orchestration.
✅ Use LangFlow to experiment and visualize quickly.

#LangChain #LLMs #AItools #LangGraph #LangFlow

🚨 CVE-2025-3248: Renewed Interest in Langflow Remote Code Execution

ℹ️ About the exploit:
#Langflow is a widely used #opensource library for building AI agents, backed by corporate support from #Datastax (now #IBM). The tool provides a web-based, drag-and-drop interface for creating agentic workflows, making it particularly attractive to businesses, but also a high-value target for exploits. Given that such workflows often integrate with critical business databases and tools, security vulnerabilities in Langflow could have severe consequences.

This risk is not hypothetical. Langchain, another leading AI framework, has already been associated with over 30 CVEs, underscoring the security challenges in the fast-moving LLM development ecosystem.

The vulnerability in Langflow allowed unauthenticated attackers to execute arbitrary code on the host machine. Discovered and disclosed by Horizon3 in late February, the issue was patched in version 1.3, released at the end of March. Below is a detailed timeline of the discovery and remediation process.

🔎 Trend analysis:
🔹 Feb 25, 2025: The vulnerability is disclosed to DataStax by Horizon3.
🔹 Mar 5, 2025: DataStax fixes the vulnerability in the development branch.
🔹 Mar 31, 2025: Langflow 1.3.0 releases, containing a fix for CVE-2025-3248.
🔹 April 7, 2025: CVE-2025-3248 is published to the NVD.
🔹 April 9, 2025: The exploit is leaked to the public, and the CrowdSec Network starts tracking the exploit.
🔹 April 11-12, 2025: The CrowdSec Network observes a first wave of exploitation attempts by approximately 200 machines.
🔹 April 12 - May 14, 2025: Attackers disappear, with barely any attacks registered in the CrowdSec Network.
🔹 May 14 - 23, 2025: The CrowdSec Network observes a renewed, smaller wave of attacks, peaking out at around 100 involved machines.

✅ How to protect your systems:
🔹Patch: If you haven’t already, ensure your publicly exposed Langflow instance is updated with the latest patch.
🔹Preemptive blocking: Use Crowdsec CTI to block IPs exploiting CVE-2025-3248 👉 https://app.crowdsec.net/cti?q=cves%3ACVE-2025-3248
🔹Stay proactive: Install the Crowdsec Web Application Firewall to stay ahead of exploit attempts with 100+ virtual patching rules available 👉 https://app.crowdsec.net/cti?q=cves%3ACVE-2025-3248

Sharing insights and taking swift action can collectively reduce the impact of these threats. This is your call to action for real-time threat intelligence and #collaborative #cybersecurity 👉 http://crowdsec.net/