The Invisible Attack Surface

Just two months ago, researchers at the University of Hong Kong released CLI-Anything, a tool that generates structured command-line interfaces for AI coding agents from any repository. It now has over 30,000 GitHub stars. But the same mechanism that makes software agent-native opens the door to agent-level poisoning. The attack community is already translating CLI-Anything's architecture into offensive playbooks. The security problem is not what CLI-Anything does. It is what CLI-Anything represents: a structural gap in how the entire security industry monitors software supply chains.

Traditional supply-chain security operates on two layers: code (SAST) and dependencies (SCA). Agent bridge tools like CLI-Anything, MCP connectors, Cursor rules files, and Claude Code skills operate on a third layer—the agent integration layer. Configuration files, skill definitions, and natural-language instruction sets tell an AI agent what software can do and how to operate it. None of it looks like code. All of it executes like code. And no mainstream security scanner has a detection category for malicious instructions embedded in agent skill definitions, because the category simply did not exist eighteen months ago.

The Kill Chain: How a Single SKILL.md Becomes a Backdoor

Here's the anatomy of the kill chain: An attacker submits a SKILL.md file to an open-source project containing setup instructions, code examples, and configuration templates. It looks like standard documentation. A code reviewer would wave it through because none of it is executable. But the code examples contain embedded instructions that an agent will parse as operational directives. A developer uses an agent bridge tool to connect their coding agent to the repository. The agent ingests the skill definition and trusts it, because no verification layer exists to distinguish benign from malicious intent at the instruction level. The agent executes the embedded instruction using its own legitimate credentials. Endpoint detection and response sees an approved API call from an authorized process and passes it. Data exfiltration, configuration changes, and credential harvesting are all moving through channels that the monitoring stack considers normal traffic.

Merritt Baer, CSO of Enkrypt AI and former Deputy CISO at AWS, told VentureBeat: 'SAST and SCA were built for code and dependencies. They don't inspect instructions.' Carter Rees, VP of AI at Reputation, identified the structural flaw: 'A significant vulnerability in enterprise AI is broken access control, where the flat authorization plane of an LLM fails to respect user permissions.' A compromised skill definition riding that flat authorization plane does not need to escalate privileges. It already has them.

Evidence Already in Production

The evidence is already in production. In a documented attack chain from April 2026, a crafted GitHub issue title triggered an AI triage bot wired into Cline. The bot exfiltrated a GITHUB_TOKEN, which the attacker used to publish a compromised npm dependency that installed a second agent on roughly 4,000 developer machines for eight hours. There was just one issue title. Attackers had eight hours of access. No human approved the action.

Snyk's ToxicSkills audit scanned 3,984 agent skills from ClawHub and skills.sh in February 2026. The results: 13.4% of all skills contained at least one critical security issue. Daily skill submissions jumped from less than 50 in mid-January to more than 500 by early February. The barrier to publishing was a SKILL.md markdown file and a GitHub account one week old. No code signing. No security review. No sandbox.

The ClawHavoc campaign, first reported by Koi Security in late January 2026, initially identified 341 malicious skills on ClawHub. A follow-up analysis by Antiy CERT expanded the count to 1,184 compromised packages across the platform. The campaign delivered Atomic Stealer through skill definitions with professional documentation. Skills named solana-wallet-tracker and polymarket-trader matched what developers actively searched for.

Winners & Losers

Winners: Security vendors like Cisco, Snyk, and OX Security are first movers in a new product category—agent supply chain security. Cisco's open-source Skill Scanner and Snyk's mcp-scan represent the first tools purpose-built for the agent integration layer. OWASP is establishing standards (Agentic Skills Top 10) that will drive compliance spending. Developers of secure agent frameworks gain a competitive advantage as trust becomes critical.

Losers: Open-source agent marketplaces like ClawHub and skills.sh face reputation damage from high percentages of malicious skills. Enterprises using unvetted agent skills face increased risk of supply chain attacks, potential data exfiltration, and downtime. Cursor, a popular AI coding tool, suffers from CVE-2026-22708, eroding user trust.

Second-Order Effects

The agent integration layer is growing fast. CLI-Anything's 33,000 stars in two months signal where software development is heading. The attacker community has already found the gap. Expect a surge in agent-specific CVEs, regulatory scrutiny, and mandatory scanning requirements. The MCP protocol layer carries similar exposure: OX Security reported that researchers poisoned nine out of 11 MCP marketplaces. Trend Micro found 492 MCP servers exposed to the internet with zero authentication in January; by April, that number had grown to 1,467.

Market / Industry Impact

Security will become a core requirement for agent platforms, leading to the emergence of dedicated agent supply chain security tools, mandatory scanning, and certification standards akin to the software supply chain security market (e.g., SBOMs). The market for agent security scanners is nascent but poised for rapid growth. Cisco and Snyk have already shipped first-generation tools. Expect acquisitions and consolidation as enterprises prioritize this layer.

Executive Action

  • Inventory every agent bridge tool in your environment. This includes CLI-Anything, MCP connectors, Cursor rules files, Claude Code skills, GitHub Copilot extensions. If you haven't inventoried them, you cannot assess the risk.
  • Audit agent skill sources the same way package registries get audited. Shut off ungoverned ingestion paths until controls are in place. Stand up a review and allowlisting process for skills. Use the OWASP Agentic Skills Top 10 as a procurement framework.
  • Deploy agent-layer scanning. Evaluate Cisco's Skill Scanner and Snyk's mcp-scan for behavioral analysis of agent instruction files. If dedicated tooling is unavailable, require a second engineer to read every SKILL.md before installation.

Why This Matters

This is not a single-vendor vulnerability. It is a structural gap in how the entire security industry monitors software supply chains. CLI-Anything is live, the attack community is discussing it, and security directors who act now get ahead of the first incident report. The window between the discovery of the gap and widespread exploitation is closing. Eighteen months ago, the detection category for agent-integration-layer poisoning did not exist. Cisco and Snyk shipped the first tools for it in April. Security directors who have not begun inventory are already behind.

Final Take

The agent integration layer is the new frontier of supply-chain attacks. CLI-Anything is not the threat—it is the proof case. The 33,000 developers who starred the repository are telling security teams where software development is heading. The attacker community has already arrived. The question is not whether your organization will be hit, but whether you will have the visibility to detect it. Baer's warning echoes: 'This feels very similar to early container security, but we're still in the 'we'll get to it' phase across most orgs.' The difference this time is speed. There's no build pipeline, no compilation barrier. Just content. Act now.




Source: VentureBeat

Rate the Intelligence Signal

Intelligence FAQ

The agent integration layer consists of configuration files, skill definitions, and natural-language instruction sets that tell AI agents how to operate. SAST and SCA tools were designed for code and dependencies, not for semantic instructions, so they have no detection categories for malicious content in this layer.

Inventory all agent bridge tools in use, audit skill sources with allowlisting, deploy agent-layer scanners like Cisco Skill Scanner or Snyk mcp-scan, and restrict agent execution privileges to limit blast radius.