Skip to content
ATR-2026-00110criticalPrivilege Escalationexperimental

Remote Code Execution via eval() and Dynamic Code Injection

Detects tools or agent instructions that invoke eval(), Function(), vm.runInNewContext(), or similar dynamic code execution primitives. These functions allow arbitrary code execution within the agent runtime, enabling an attacker to break out of sandboxed tool contexts, access the host process, or pivot to child_process for full system compromise.

Severity
critical
Category
Privilege Escalation
Scan Target
mcp
Author
ATR Community

Response Actions

block toolalertsnapshot

References

OWASP Agentic
ASI05:2026 - Unexpected Code Execution