LetspingLETSPING

LangChain×PostgreSQL

Add Human-in-the-Loop to LangChain for PostgreSQL security.

Stop your autonomous agents from making highly destructive, hallucinated API calls to PostgreSQL. Wrap your execution logic in LetsPing to enforce a hard pause until a human reviews the payload.

How it works

1. Intercept PostgreSQL Logic

Instead of hitting the PostgreSQL API directly from your LangChain agent, you yield the payload to LetsPing. The agent's execution thread halts completely.

2. Human Review & Patching

You get a push notification on your phone. You review the exact PostgreSQL JSON payload the agent wanted to send. You can approve it, reject it, or patch the values directly.

3. Resume Execution

Once approved, the LangChain execution thread resumes, and the actual PostgreSQL mutation is allowed to proceed using the (potentially patched) payload.

LangChain Example Implementation
import { createLetsPingTool } from "@letsping/adapters/langchain";
import { z } from "zod";

const postgresqlTool = createLetsPingTool({
  name: "execute_postgresql_action",
  description: "Executes a destructive action on PostgreSQL. Requires human approval.",
  priority: "high",
  schema: z.object({
    // Define the exact PostgreSQL payload your agent wants to send
    id: z.string(),
    action: z.string(),
  })
});