Skip to content
ATR-2026-00110criticalPrivilege Escalationexperimental

Remote Code Execution via eval() and Dynamic Code Injection

Detects tools or agent instructions that invoke eval(), Function(), vm.runInNewContext(), or similar dynamic code execution primitives. These functions allow arbitrary code execution within the agent runtime, enabling an attacker to break out of sandboxed tool contexts, access the host process, or pivot to child_process for full system compromise.

嚴重度
critical
類別
Privilege Escalation
掃描目標
mcp
作者
ATR Community

建議回應

block toolalertsnapshot

參考資料

OWASP Agentic
ASI05:2026 - Unexpected Code Execution