54% of malicious agent skills are authored by the same threat actor.

Skills are risky. 157 confirmed malicious skills with 632 vulnerabilities across 98,380 skills.

Yi Liu and the team published "Malicious Agent Skills in the Wild" — the first behaviorally verified dataset of malicious agent skills.

Highlights:

My take:

  1. Repeating myself again. We are in the browser extension era of 2012 and Android malware of 2020.
  2. 84% of vulnerabilities in Markdown — basic code scanners miss them. Take the open-source scanner from Cisco or many others available.
  3. Malicious skills stay on marketplaces for 3+ months. Marketplaces have a long journey ahead learning from Google and Apple app stores.
  4. We need sandboxing for both skills and the agent.

Malicious Agent Skills in the Wild |

Cisco Skills Scanner

157 confirmed malicious agent skills with 632 vulnerabilities across 98,380 skills Credential access to exfiltration kill chain dominates at 37% of malicious skills 84.2% of vulnerabilities found in SKILL.md files, invisible to code scanners Obfuscation techniques: undocumented endpoints at 47.2% and code obfuscation at 11% Example malicious skill silently adding attacker email to BCC without user consent 54% of malicious skills traced to a single threat actor across agent marketplaces