LangChain×PostgreSQL
Add Human-in-the-Loop to LangChain for PostgreSQL security.
Stop your autonomous agents from making highly destructive, hallucinated API calls to PostgreSQL. Wrap your execution logic in LetsPing to enforce a hard pause until a human reviews the payload.
How it works
1. Intercept PostgreSQL Logic
Instead of hitting the PostgreSQL API directly from your LangChain agent, you yield the payload to LetsPing. The agent's execution thread halts completely.
2. Human Review & Patching
You get a push notification on your phone. You review the exact PostgreSQL JSON payload the agent wanted to send. You can approve it, reject it, or patch the values directly.
3. Resume Execution
Once approved, the LangChain execution thread resumes, and the actual PostgreSQL mutation is allowed to proceed using the (potentially patched) payload.
LangChain Example Implementation
import { createLetsPingTool } from "@letsping/adapters/langchain";
import { z } from "zod";
const postgresqlTool = createLetsPingTool({
name: "execute_postgresql_action",
description: "Executes a destructive action on PostgreSQL. Requires human approval.",
priority: "high",
schema: z.object({
// Define the exact PostgreSQL payload your agent wants to send
id: z.string(),
action: z.string(),
})
});