Skip to content

Your AI agents have access to everything.

AWS keys. SSH keys. API tokens. Browser passwords. Every tool you install can read them — and most people never check. Firmis scans your entire agent stack in one command.

Research published in 2025–2026 shows what’s already happening to agent users:

StatSource
72.8% MCP tool poisoning attack success rateMCPTox Research
82% of MCP servers have path traversal vulnerabilitiesEndor Labs
7.1% of agent marketplace skills are actively stealing credentialsFirmis Research
1.2M malicious packages discovered in the wildSonatype 2026
CVSS 10/10 zero-click RCE in Claude Desktop ExtensionsLayerX Security

You are not the target. Your credentials are. And they’re sitting one misconfigured MCP server away from leaving your machine.

Find what's hiding in your agent stack

209 detection rules. 16 threat categories. Prompt injection, credential harvesting, tool poisoning, supply chain attacks — scanned in seconds, reported in plain English.

Run your first scan →

Audit every MCP server you've installed

72.8% of poisoning attacks succeed against popular LLMs. Firmis checks your MCP configs for hidden instructions, malicious tool definitions, and unauthorized network calls before they run.

MCP security guide →

Know exactly what's in your AI stack

CycloneDX 1.7 Agent Bill of Materials — every component, dependency, model, and tool definition catalogued. Know what you have before you ship it.

Generate your BOM →

Block threats in CI before they reach prod

One command: discover → BOM → scan → report. SARIF output for GitHub Security tab. Exit non-zero on high or critical findings. Done.

Set up CI →

PlatformWhat gets scannedStatus
Claude SkillsCLAUDE.md, tool definitions, permission scopesGA
MCP ServersServer configs, tool handlers, transport layerGA
Cursor Rules.cursorrules, workspace settings, extensionsGA
Codex PluginsPlugin manifests, tool definitionsBeta
CrewAI AgentsAgent configs, tool definitions, task chainsBeta
AutoGPT PluginsPlugin manifests, command handlersExperimental
OpenClaw SkillsSkill definitions, skill handlersExperimental
Nanobot PluginsPlugin configs, tool handlersExperimental
npx firmis scan .
┌─────────────┐ ┌──────────────┐ ┌─────────────┐
│ Discovery │───▶│ Rule Engine │───▶│ Reporter │
│ │ │ │ │ │
│ Auto-detect │ │ 209 YAML │ │ Terminal │
│ 8 platforms │ │ rules across │ │ JSON / SARIF │
│ components │ │ 16 threat │ │ HTML report │
│ dependencies │ │ categories │ │ │
└─────────────┘ └──────────────┘ └─────────────┘

No account. No telemetry. Nothing leaves your machine.

How the detection engine works →

Every finding comes with a severity rating, a plain English explanation of what it means, and what to do about it.

CategoryWhat it catchesSeverity
Tool PoisoningHidden instructions in tool descriptions that hijack your agentCritical
Data ExfiltrationSkills sending your local files to external serversCritical–High
Credential HarvestingTools reading AWS, GCP, Azure, or SSH credentialsCritical–High
Prompt InjectionInstructions that override your agent’s behaviorCritical–High
Secret DetectionHardcoded API keys, tokens, and passwordsCritical–Medium
Supply ChainDependencies with known vulnerabilities (OSV database)High–Medium
Malware SignaturesKnown malicious code patternsCritical
Known MaliciousPackages flagged across threat intelligence databasesCritical
Network AbuseUnauthorized DNS or HTTP callsHigh–Medium
File System AbuseUnauthorized reads or writes to your filesystemHigh–Medium
Permission OvergrantTool scopes wider than they need to beHigh–Medium
Agent Memory PoisoningInstructions corrupting your agent’s context windowHigh
Malware DistributionTools spreading payloads to other systemsCritical–High
Privilege EscalationGaining access your agent was never grantedHigh
Insecure ConfigurationWeak or missing security settingsMedium–Low
Access ControlMissing authentication or authorization checksHigh–Medium

View all 209 detection rules →

Wait — my AI tools can actually steal my stuff?

Yes. Every agent you install — Cursor, Claude, MCP servers, OpenClaw skills — gets access to your files, API keys, and credentials. Most people never check what these tools actually do behind the scenes. Our research found that 7.1% of agent marketplace skills are actively stealing credentials or sending data to external servers. One command will tell you if yours are clean.

What exactly does Firmis check for?

209 rules across 16 threat categories: prompt injection, credential harvesting, data exfiltration, tool poisoning, supply chain attacks, hardcoded secrets, malware signatures, and more. Every finding is explained in plain English — not cryptic error codes. “This skill is reading your AWS credentials and sending them to an unknown server” is the kind of message you get.

Is my code uploaded anywhere?

No. Firmis is fully offline. It reads your config files and source code locally — nothing leaves your machine. No telemetry, no analytics, no account required. Ever.

I’m not a security expert. Can I still use this?

That’s exactly who we built it for. You don’t need to understand regex patterns or YARA rules. You run npx firmis scan . and you get a report that says what’s wrong and what to do about it. Plain English. Every time.

How is this different from Snyk or Semgrep?

Snyk and Semgrep are built for traditional application code. They don’t know what an MCP server is, what tool poisoning looks like, or how to read a CLAUDE.md file for hidden instructions. Firmis is purpose-built for the AI agent threat surface: 8 platforms, 209 rules written specifically for how agents get compromised.

Is it really free?

Completely free. npx firmis scan . — no account, no credit card, no usage limits. You get a security grade (A through F) and a full list of findings in plain English.