Skip to main content

LLM Function Calling

Enables LLMs to execute functions for structured outputs and integrate with external systems, enhancing interaction capabilities.

Install this skill

or
30/100

Security score

The LLM Function Calling skill was audited on Feb 12, 2026 and we found 6 security issues across 1 threat category, including 4 high-severity. Review the findings below before installing.

Categories Tested

Security Issues

high line 1118

Direct command execution function call

SourceSKILL.md
1118dangerous_commands = ["eval(", "exec(", "system(", "__import__"]
high line 1338

Direct command execution function call

SourceSKILL.md
1338dangerous_keywords = ["import os", "import subprocess", "exec(", "eval("]
high line 1118

Eval function call - arbitrary code execution

SourceSKILL.md
1118dangerous_commands = ["eval(", "exec(", "system(", "__import__"]
high line 1338

Eval function call - arbitrary code execution

SourceSKILL.md
1338dangerous_keywords = ["import os", "import subprocess", "exec(", "eval("]
medium line 1118

System command execution

SourceSKILL.md
1118dangerous_commands = ["eval(", "exec(", "system(", "__import__"]
medium line 1349

Python subprocess execution

SourceSKILL.md
1349result = subprocess.run(
Scanned on Feb 12, 2026
View Security Dashboard
Installation guide →