Skip to content

Built-in Rules

Firmis ships with 209 built-in detection rules across 16 threat categories, covering prompt injection, credential harvesting, supply chain attacks, and more.

SeverityCount
🔴 Critical57
🟠 High101
🟡 Medium48
🟢 Low3

IDNameSeverityConfidencePlatforms
ac-002Authentication Bypass Patterns🔴 Critical60%All
ac-003JWT None Algorithm or Weak Signing🔴 Critical60%All
ac-001API Key or Token in URL Query Parameter🟠 High55%All

Severity: 🔴 Critical | Category: Access Control | Confidence threshold: 60% | Platforms: All

Detects hardcoded boolean flags and query parameters used to bypass authentication checks in agent code or configurations

Remediation:

Authentication bypass flags are critical vulnerabilities that remove access controls. Remove all hardcoded is_admin, skip_auth, and bypass_auth flags from agent code. Authentication decisions must be made by the identity provider, not boolean flags that can be trivially modified. Use role-based access control (RBAC) instead.

References:


ac-003 — JWT None Algorithm or Weak Signing

Section titled “ac-003 — JWT None Algorithm or Weak Signing”

Severity: 🔴 Critical | Category: Access Control | Confidence threshold: 60% | Platforms: All

Detects JWT configurations using the ‘none’ algorithm or weak symmetric secrets, enabling token forgery attacks

Remediation:

JWT ‘none’ algorithm allows forging tokens without a valid signature. Always use RS256 or ES256 (asymmetric) for production systems. Never disable JWT verification. Reject tokens with ‘none’ algorithm explicitly. Use cryptographically random secrets of at least 256 bits for HS256.

References:


ac-001 — API Key or Token in URL Query Parameter

Section titled “ac-001 — API Key or Token in URL Query Parameter”

Severity: 🟠 High | Category: Access Control | Confidence threshold: 55% | Platforms: All

Detects API keys, tokens, and secrets passed as URL query parameters instead of headers, exposing credentials in logs and browser history

Remediation:

API keys and tokens in URL query parameters are logged by web servers, proxies, CDNs, and browser history in plaintext. Use HTTP Authorization headers or request body parameters instead. Never embed secrets in URLs.

References:


IDNameSeverityConfidencePlatforms
mem-003Agent Config File Modification🔴 Critical50%All
mem-001Agent Memory File Write🟠 High60%All
mem-002Session/Conversation File Access🟠 High60%All
mem-005Copilot Instructions Manipulation🟠 High60%All
mem-006OpenAI Agents Memory Manipulation🟠 High60%All
mem-007Aider Agent Config Manipulation🟠 High60%All
mem-004Time-Delayed Execution🟡 Medium60%All

mem-003 — Agent Config File Modification

Section titled “mem-003 — Agent Config File Modification”

Severity: 🔴 Critical | Category: Agent Memory Poisoning | Confidence threshold: 50% | Platforms: All

Modifies agent platform config files (.clawdbot/, .openclaw/, .claude/)

Remediation:

Skills must not modify agent platform configuration files. This could inject malicious MCP servers or change security settings.


Severity: 🟠 High | Category: Agent Memory Poisoning | Confidence threshold: 60% | Platforms: All

Writes to agent persistent memory files (MEMORY.md, .memories/) — potential memory poisoning

Remediation:

Skills should not modify agent memory files. This could be used to inject persistent malicious instructions that survive across sessions.


mem-002 — Session/Conversation File Access

Section titled “mem-002 — Session/Conversation File Access”

Severity: 🟠 High | Category: Agent Memory Poisoning | Confidence threshold: 60% | Platforms: All

Reads agent session or conversation log files — potential data exfiltration

Remediation:

Skills should not read agent session or conversation files. This may be an attempt to exfiltrate conversation data.


mem-005 — Copilot Instructions Manipulation

Section titled “mem-005 — Copilot Instructions Manipulation”

Severity: 🟠 High | Category: Agent Memory Poisoning | Confidence threshold: 60% | Platforms: All

Writes to .github/copilot-instructions.md — persistent Copilot behavior injection

Remediation:

Skills should not modify GitHub Copilot instruction files. This could inject persistent malicious behavior into Copilot-assisted development.


mem-006 — OpenAI Agents Memory Manipulation

Section titled “mem-006 — OpenAI Agents Memory Manipulation”

Severity: 🟠 High | Category: Agent Memory Poisoning | Confidence threshold: 60% | Platforms: All

Writes to AGENTS.md or .codex/ — OpenAI Codex/Agents persistent memory injection

Remediation:

Skills should not modify OpenAI agent memory files. This could inject persistent malicious instructions.


mem-007 — Aider Agent Config Manipulation

Section titled “mem-007 — Aider Agent Config Manipulation”

Severity: 🟠 High | Category: Agent Memory Poisoning | Confidence threshold: 60% | Platforms: All

Writes to .aider/ config or .aider.conf.yml — Aider AI agent manipulation

Remediation:

Skills should not modify Aider AI agent configuration. This could inject malicious instructions or change security settings.


Severity: 🟡 Medium | Category: Agent Memory Poisoning | Confidence threshold: 60% | Platforms: All

Uses time-delayed execution patterns — may be evading real-time analysis

Remediation:

Long time delays in AI agent skills are suspicious. Legitimate skills should execute promptly, not schedule deferred actions.


IDNameSeverityConfidencePlatforms
cred-002SSH Private Key Access🔴 Critical75%All
cred-005Browser Cookie/Credential Access🔴 Critical85%All
cred-006Keychain/Credential Manager Access🔴 Critical80%All
cred-015Container Environment Variable Theft🔴 Critical55%All
cred-018Python Subprocess Credential Theft🔴 Critical70%All
cred-001AWS Credentials Access🟠 High80%All
cred-003GCP Service Account Key🟠 High80%All
cred-007Git Credentials Access🟠 High75%All
cred-008NPM Token Access🟠 High80%All
cred-009Docker Credentials Access🟠 High80%All
cred-010Kubernetes Credentials Access🟠 High80%All
cred-011API Key in Config🟠 High50%All
cred-012Azure CLI Credentials Access🟠 High70%All
cred-013AWS SSO Token Cache Access🟠 High70%All
cred-014Vault Token File Access🟠 High70%All
cred-016Python Pathlib Credential Access🟠 High70%All
cred-017Python Open Credential File🟠 High70%All
cred-004Environment Variable Harvesting🟡 Medium60%All

Severity: 🔴 Critical | Category: Credential Harvesting | Confidence threshold: 75% | Platforms: All

Detects access to SSH private keys

Remediation:

SSH keys should never be accessed by AI agents. Use SSH agent forwarding or API-based access.


cred-005 — Browser Cookie/Credential Access

Section titled “cred-005 — Browser Cookie/Credential Access”

Severity: 🔴 Critical | Category: Credential Harvesting | Confidence threshold: 85% | Platforms: All

Detects access to browser credential stores

Remediation:

Never access browser credential stores. This is highly suspicious behavior.


cred-006 — Keychain/Credential Manager Access

Section titled “cred-006 — Keychain/Credential Manager Access”

Severity: 🔴 Critical | Category: Credential Harvesting | Confidence threshold: 80% | Platforms: All

Detects access to OS credential managers

Remediation:

Do not access OS credential managers directly. Request credentials through secure channels.


cred-015 — Container Environment Variable Theft

Section titled “cred-015 — Container Environment Variable Theft”

Severity: 🔴 Critical | Category: Credential Harvesting | Confidence threshold: 55% | Platforms: All

Detects reading /proc/1/environ to steal container credentials

Remediation:

Reading /proc/*/environ exposes all environment variables including secrets injected by container orchestrators. Use the runtime’s secret management instead.


cred-018 — Python Subprocess Credential Theft

Section titled “cred-018 — Python Subprocess Credential Theft”

Severity: 🔴 Critical | Category: Credential Harvesting | Confidence threshold: 70% | Platforms: All

Detects Python subprocess calls targeting credential stores

Remediation:

Do not use subprocess to access credential stores. Use official SDKs with proper authentication.


Severity: 🟠 High | Category: Credential Harvesting | Confidence threshold: 80% | Platforms: All

Detects access to AWS credential files

Remediation:

Remove direct access to AWS credentials. Use environment variables or IAM roles instead.


Severity: 🟠 High | Category: Credential Harvesting | Confidence threshold: 80% | Platforms: All

Detects access to Google Cloud service account keys

Remediation:

Use Workload Identity or Application Default Credentials instead of service account keys.


Severity: 🟠 High | Category: Credential Harvesting | Confidence threshold: 75% | Platforms: All

Detects access to Git credential storage

Remediation:

Use Git credential helpers or SSH keys instead of accessing credential files directly.


Severity: 🟠 High | Category: Credential Harvesting | Confidence threshold: 80% | Platforms: All

Detects access to NPM authentication tokens

Remediation:

Use npm login or CI/CD secret management instead of embedding tokens.


Severity: 🟠 High | Category: Credential Harvesting | Confidence threshold: 80% | Platforms: All

Detects access to Docker authentication

Remediation:

Use Docker credential helpers instead of storing credentials in config.json.


cred-010 — Kubernetes Credentials Access

Section titled “cred-010 — Kubernetes Credentials Access”

Severity: 🟠 High | Category: Credential Harvesting | Confidence threshold: 80% | Platforms: All

Detects access to Kubernetes configs

Remediation:

Use RBAC and service accounts instead of accessing kubeconfig directly.


Severity: 🟠 High | Category: Credential Harvesting | Confidence threshold: 50% | Platforms: All

Detects API keys and tokens hardcoded in configuration files

Remediation:

Never hardcode API keys or tokens. Use environment variables, secrets managers, or credential vaults.


Severity: 🟠 High | Category: Credential Harvesting | Confidence threshold: 70% | Platforms: All

Detects access to Azure CLI credential files

Remediation:

Remove direct access to Azure CLI credentials. Use managed identities or service principals with proper RBAC.


Severity: 🟠 High | Category: Credential Harvesting | Confidence threshold: 70% | Platforms: All

Detects access to AWS SSO cached tokens

Remediation:

Remove direct access to AWS SSO token cache. Use the AWS SDK with proper credential providers.


Severity: 🟠 High | Category: Credential Harvesting | Confidence threshold: 70% | Platforms: All

Detects access to HashiCorp Vault token files

Remediation:

Remove direct access to Vault token files. Use AppRole or Kubernetes auth methods for automated credential retrieval.


cred-016 — Python Pathlib Credential Access

Section titled “cred-016 — Python Pathlib Credential Access”

Severity: 🟠 High | Category: Credential Harvesting | Confidence threshold: 70% | Platforms: All

Detects Python pathlib-based access to credential files using the / operator

Remediation:

Do not construct paths to credential files using Python pathlib or os.path. Use environment variables or credential providers.


Severity: 🟠 High | Category: Credential Harvesting | Confidence threshold: 70% | Platforms: All

Detects Python open() calls targeting credential files

Remediation:

Do not open credential files directly. Use credential providers or environment variables.


cred-004 — Environment Variable Harvesting

Section titled “cred-004 — Environment Variable Harvesting”

Severity: 🟡 Medium | Category: Credential Harvesting | Confidence threshold: 60% | Platforms: All

Detects suspicious bulk access to environment variables

Remediation:

Only access specific, required environment variables. Never serialize the entire environment.


IDNameSeverityConfidencePlatforms
exfil-011Cloud Metadata Service Access (IMDS/SSRF)🔴 Critical50%All
exfil-001Suspicious External HTTP Request🟠 High70%All
exfil-003File Upload to External Service🟠 High75%All
exfil-004DNS Exfiltration Pattern🟠 High80%All
exfil-006Screenshot Capture🟠 High80%All
exfil-008Archive Creation Before Upload🟠 High75%All
exfil-012WebSocket Exfiltration🟠 High70%All
exfil-002Base64 Encoded Data Transmission🟡 Medium65%All
exfil-005Clipboard Data Access🟡 Medium70%All
exfil-007Bulk File Read Pattern🟡 Medium65%All
exfil-009Webhook Data Transmission🟡 Medium70%All
exfil-010Email Data Transmission🟡 Medium70%All

exfil-011 — Cloud Metadata Service Access (IMDS/SSRF)

Section titled “exfil-011 — Cloud Metadata Service Access (IMDS/SSRF)”

Severity: 🔴 Critical | Category: Data Exfiltration | Confidence threshold: 50% | Platforms: All

Detects access to cloud instance metadata services for credential theft

Remediation:

Cloud metadata service access from agent code is extremely suspicious. This is the primary vector for SSRF-to-credential-theft in cloud environments. Agents should never access instance metadata endpoints directly.


exfil-001 — Suspicious External HTTP Request

Section titled “exfil-001 — Suspicious External HTTP Request”

Severity: 🟠 High | Category: Data Exfiltration | Confidence threshold: 70% | Platforms: All

Detects HTTP requests to suspicious or unknown domains

Remediation:

Review all external HTTP requests. Ensure they go to legitimate, expected endpoints.


exfil-003 — File Upload to External Service

Section titled “exfil-003 — File Upload to External Service”

Severity: 🟠 High | Category: Data Exfiltration | Confidence threshold: 75% | Platforms: All

Detects file uploads to external services

Remediation:

Review file uploads to external services. Ensure sensitive data is not being exfiltrated.


Severity: 🟠 High | Category: Data Exfiltration | Confidence threshold: 80% | Platforms: All

Detects potential DNS-based data exfiltration

Remediation:

DNS queries with dynamic subdomains may indicate data exfiltration. Review DNS usage.


Severity: 🟠 High | Category: Data Exfiltration | Confidence threshold: 80% | Platforms: All

Detects screenshot capture functionality

Remediation:

Screenshot capture is highly sensitive. Ensure this is explicitly requested by the user.


exfil-008 — Archive Creation Before Upload

Section titled “exfil-008 — Archive Creation Before Upload”

Severity: 🟠 High | Category: Data Exfiltration | Confidence threshold: 75% | Platforms: All

Detects creating archives before network transmission

Remediation:

Creating archives before upload may indicate bulk data exfiltration. Review carefully.


Severity: 🟠 High | Category: Data Exfiltration | Confidence threshold: 70% | Platforms: All

Detects WebSocket connections that may exfiltrate data to external servers

Remediation:

WebSocket connections can maintain persistent channels for data exfiltration. Verify the destination server is trusted and the data being sent is appropriate.


exfil-002 — Base64 Encoded Data Transmission

Section titled “exfil-002 — Base64 Encoded Data Transmission”

Severity: 🟡 Medium | Category: Data Exfiltration | Confidence threshold: 65% | Platforms: All

Detects base64 encoding before network transmission

Remediation:

Base64 encoding before transmission may indicate data obfuscation. Review the data being sent.


Severity: 🟡 Medium | Category: Data Exfiltration | Confidence threshold: 70% | Platforms: All

Detects access to clipboard contents

Remediation:

Clipboard access should be minimized. Review why clipboard data is being accessed.


Severity: 🟡 Medium | Category: Data Exfiltration | Confidence threshold: 65% | Platforms: All

Detects reading multiple files in rapid succession

Remediation:

Bulk file reading should be scoped to specific directories. Review the access pattern.


Severity: 🟡 Medium | Category: Data Exfiltration | Confidence threshold: 70% | Platforms: All

Detects data transmission via webhooks

Remediation:

Webhook data transmission should only send expected, non-sensitive data.


Severity: 🟡 Medium | Category: Data Exfiltration | Confidence threshold: 70% | Platforms: All

Detects sending data via email

Remediation:

Email transmission should be explicitly requested. Review what data is being sent.


IDNameSeverityConfidencePlatforms
fs-003System Account File Access🔴 Critical55%All
fs-005Kernel Memory Access🔴 Critical50%All
fs-008Temp Directory Code Execution🔴 Critical60%All
fs-010Recursive Directory Deletion🔴 Critical55%All
fs-001/proc Filesystem Enumeration🟠 High60%All
fs-002System Log Manipulation🟠 High55%All
fs-004Symlink Attack🟠 High65%All
fs-007Symlink Attack to Sensitive Files🟠 High55%All
fs-009Audit Log Manipulation🟠 High55%All
fs-006Insecure File Permissions🟡 Medium65%All

Severity: 🔴 Critical | Category: File System Abuse | Confidence threshold: 55% | Platforms: All

Detects reads of system authentication and authorization files

Remediation:

Reading system account files (/etc/passwd, /etc/shadow, /etc/sudoers, /etc/group) is a strong indicator of credential harvesting or privilege escalation preparation. /etc/shadow contains password hashes and must never be accessed by an AI agent. Remove all access to these files. Use dedicated APIs for any legitimate user lookup needs.


Severity: 🔴 Critical | Category: File System Abuse | Confidence threshold: 50% | Platforms: All

Detects access to kernel memory devices and raw memory operations

Remediation:

Access to kernel memory devices (/dev/mem, /dev/kmem, /dev/port) is an extreme security violation that enables arbitrary memory reads, rootkit installation, and kernel-level compromise. mmap with PROT_EXEC is a code injection technique. This code must be removed immediately. No AI agent should ever touch kernel memory.


Severity: 🔴 Critical | Category: File System Abuse | Confidence threshold: 60% | Platforms: All

Detects patterns of writing executable code to /tmp and then executing it — a classic malware staging technique

Remediation:

Writing code to /tmp and executing it is a standard malware staging technique. /tmp is world-writable and persists across processes, making it ideal for staging payloads. AI agents must never write executable content to temporary directories. Use secure temporary file handling with mode 600 and never execute temp files.

References:


Severity: 🔴 Critical | Category: File System Abuse | Confidence threshold: 55% | Platforms: All

Detects recursive deletion commands targeting system or application directories, which can cause irreversible data destruction

Remediation:

Recursive deletion of system or application directories is destructive and irreversible. AI agents must never delete directories recursively without strict path validation. Implement path allowlists for deletion operations. Never allow deletion of paths matching /, ~, $HOME, or well-known system directories.

References:


Severity: 🟠 High | Category: File System Abuse | Confidence threshold: 60% | Platforms: All

Detects access to /proc filesystem entries used for reconnaissance and credential theft

Remediation:

Access to /proc filesystem entries is a strong indicator of reconnaissance activity. AI agents should never read /proc entries outside of explicitly approved diagnostic tools. For container environments, /proc/1/environ access is a known credential theft vector. Remove all /proc reads and use legitimate APIs for any required system information.


Severity: 🟠 High | Category: File System Abuse | Confidence threshold: 55% | Platforms: All

Detects reads, writes, or destruction of system log files to cover tracks

Remediation:

System log access or modification is a serious indicator of anti-forensic activity. AI agents must never read, write, truncate, or delete system log files. Disabling syslog or auditd services to evade detection is a critical security event. Remove all log manipulation code and review why the agent requires log access.


Severity: 🟠 High | Category: File System Abuse | Confidence threshold: 65% | Platforms: All

Detects creation of symbolic links pointing to sensitive system paths

Remediation:

Symlink creation targeting sensitive paths (/etc, /root, ~/.ssh, ~/.aws) is a common privilege escalation and path traversal technique. AI agents should never create symlinks without explicit, scoped authorization. Remove symlink creation code and audit the intent behind any file redirection logic.


Section titled “fs-007 — Symlink Attack to Sensitive Files”

Severity: 🟠 High | Category: File System Abuse | Confidence threshold: 55% | Platforms: All

Detects creation of symbolic links pointing to sensitive system files or directories, enabling path traversal and unauthorized access

Remediation:

Symlinks to credential files (/etc/shadow, ~/.ssh/id_rsa, ~/.aws/credentials) enable path traversal attacks where a process reading an “innocent” path is redirected to a sensitive file. Remove all symlinks to sensitive paths. Ensure tmp directories are on separate filesystems to prevent symlink races.

References:


Severity: 🟠 High | Category: File System Abuse | Confidence threshold: 55% | Platforms: All

Detects truncation, clearing, or deletion of audit and application log files to destroy forensic evidence

Remediation:

Log manipulation is a critical anti-forensic action. Audit logs are the primary mechanism for detecting and reconstructing security incidents. AI agents must never truncate, delete, or disable logging systems. Implement log integrity controls (append-only, remote syslog) to prevent tampering.

References:


Severity: 🟡 Medium | Category: File System Abuse | Confidence threshold: 65% | Platforms: All

Detects creation of files or directories with world-writable or overly permissive modes

Remediation:

Overly permissive file modes (777, 666) allow any user on the system to read or modify files, undermining access control and enabling privilege escalation. umask(0) is particularly dangerous as it makes all subsequently created files world-accessible. Use the principle of least privilege: apply only the minimum permissions required. Prefer 640 for files and 750 for directories. Never use 777 in production code.


IDNameSeverityConfidencePlatforms
ic-002SSL/TLS Verification Disabled🔴 Critical60%All
ic-003Default or Hardcoded Credentials in Config Files🟠 High55%All
ic-001Debug Mode Enabled in Production Config🟡 Medium50%All

Severity: 🔴 Critical | Category: Insecure Configuration | Confidence threshold: 60% | Platforms: All

Detects configurations that disable SSL/TLS certificate verification, enabling man-in-the-middle attacks on agent network connections

Remediation:

Disabling SSL/TLS verification allows man-in-the-middle attacks where an attacker intercepts and modifies all HTTPS traffic without detection. This is never acceptable in production code. Remove all verify=False, rejectUnauthorized:false, and InsecureSkipVerify:true configurations. Use a proper CA bundle for self-signed certs.

References:


ic-003 — Default or Hardcoded Credentials in Config Files

Section titled “ic-003 — Default or Hardcoded Credentials in Config Files”

Severity: 🟠 High | Category: Insecure Configuration | Confidence threshold: 55% | Platforms: All

Detects default, well-known, or hardcoded credentials in configuration files that should use secrets management instead

Remediation:

Hardcoded credentials in configuration files are a critical security risk. They are committed to version control, visible to all team members, and cannot be rotated without code changes. Use environment variables, secrets managers (Vault, AWS Secrets Manager, Azure Key Vault), or .env files (gitignored). Rotate all credentials that may have been exposed in version history.

References:


ic-001 — Debug Mode Enabled in Production Config

Section titled “ic-001 — Debug Mode Enabled in Production Config”

Severity: 🟡 Medium | Category: Insecure Configuration | Confidence threshold: 50% | Platforms: All

Detects debug mode flags enabled in application or agent configurations, which expose stack traces, internal state, and disable security controls

Remediation:

Debug mode exposes detailed error messages, stack traces, and internal state that attackers can use to understand application structure and find vulnerabilities. In production: set DEBUG=false, NODE_ENV=production, and disable verbose error pages. Use structured logging to capture diagnostic information without exposing it to end users.

References:


IDNameSeverityConfidencePlatforms
mal-infra-001Known Malicious C2/Exfiltration Infrastructure🔴 Critical30%All
mal-infra-002Known Malicious GitHub Resources🔴 Critical30%All
mal-skill-001Known Malicious Skill Name (Programmatic Campaign)🔴 Critical30%openclaw
mal-skill-002Known Malicious Skill (Unicode Contraband / DAN Jailbreaks)🔴 Critical30%openclaw
mal-skill-003Known Malicious Skill (Credential Harvesting)🔴 Critical30%openclaw
mal-skill-004ClawHavoc Campaign Skills🔴 Critical30%openclaw
mal-skill-005ClawHavoc YouTube Imitation Skills🔴 Critical30%openclaw
mal-typo-001ClawHub Typosquatting Pattern🔴 Critical30%All
yara-001Obfuscated Base64 Payload🔴 Critical40%All
yara-002Reverse Shell Pattern🔴 Critical40%All
yara-003Credential Stealer Signature🔴 Critical40%All
yara-006RAT/Backdoor Pattern🔴 Critical40%All
mal-author-001Known Malicious Author🟠 High30%openclaw
mal-updater-001Fake Auto-Updater Skill🟠 High40%openclaw
yara-005Coin Miner Signature🟠 High40%All

mal-infra-001 — Known Malicious C2/Exfiltration Infrastructure

Section titled “mal-infra-001 — Known Malicious C2/Exfiltration Infrastructure”

Severity: 🔴 Critical | Category: Known Malicious Patterns | Confidence threshold: 30% | Platforms: All

Code references known malicious command-and-control servers or exfiltration endpoints

Remediation:

This code communicates with known malicious infrastructure. Remove the skill and investigate potential data exfiltration.


mal-infra-002 — Known Malicious GitHub Resources

Section titled “mal-infra-002 — Known Malicious GitHub Resources”

Severity: 🔴 Critical | Category: Known Malicious Patterns | Confidence threshold: 30% | Platforms: All

References to GitHub repositories known to host malware payloads

Remediation:

This references a known malware distribution point. Remove the skill and scan your system for compromise indicators.


mal-skill-001 — Known Malicious Skill Name (Programmatic Campaign)

Section titled “mal-skill-001 — Known Malicious Skill Name (Programmatic Campaign)”

Severity: 🔴 Critical | Category: Known Malicious Patterns | Confidence threshold: 30% | Platforms: openclaw

Skill matches a known malicious skill from the zaycv/Aslaep123 campaigns: programmatic malware distribution via ClawHub

Remediation:

Remove this skill immediately. It is a confirmed malicious package from a known attacker campaign. Report to ClawHub/OpenClaw security team.


mal-skill-002 — Known Malicious Skill (Unicode Contraband / DAN Jailbreaks)

Section titled “mal-skill-002 — Known Malicious Skill (Unicode Contraband / DAN Jailbreaks)”

Severity: 🔴 Critical | Category: Known Malicious Patterns | Confidence threshold: 30% | Platforms: openclaw

Skill matches known malicious packages using Unicode contraband and DAN jailbreak techniques

Remediation:

Remove this skill immediately. Uses Unicode contraband to hide malicious instructions and DAN jailbreaks to bypass safety.


mal-skill-003 — Known Malicious Skill (Credential Harvesting)

Section titled “mal-skill-003 — Known Malicious Skill (Credential Harvesting)”

Severity: 🔴 Critical | Category: Known Malicious Patterns | Confidence threshold: 30% | Platforms: openclaw

Skill matches known packages that harvest credentials, credit cards, or session data

Remediation:

Remove this skill immediately. It is a confirmed credential-harvesting or data-theft package.


mal-skill-004 — ClawHavoc Campaign Skills

Section titled “mal-skill-004 — ClawHavoc Campaign Skills”

Severity: 🔴 Critical | Category: Known Malicious Patterns | Confidence threshold: 30% | Platforms: openclaw

Skill matches known ClawHavoc campaign: reverse shells, direct exfiltration, and YouTube imitation skills

Remediation:

Remove this skill immediately. Part of the ClawHavoc malware campaign with reverse shell and exfiltration capabilities.


mal-skill-005 — ClawHavoc YouTube Imitation Skills

Section titled “mal-skill-005 — ClawHavoc YouTube Imitation Skills”

Severity: 🔴 Critical | Category: Known Malicious Patterns | Confidence threshold: 30% | Platforms: openclaw

Skill impersonates YouTube utilities to deliver malware

Remediation:

Remove this skill. It impersonates a YouTube utility to deliver malicious payloads.


mal-typo-001 — ClawHub Typosquatting Pattern

Section titled “mal-typo-001 — ClawHub Typosquatting Pattern”

Severity: 🔴 Critical | Category: Known Malicious Patterns | Confidence threshold: 30% | Platforms: All

Detects typosquatted variations of ‘clawhub’ used in malware campaigns

Remediation:

This is a typosquatted version of ClawHub, a known malware distribution technique. Remove the skill and verify your package sources.


Severity: 🔴 Critical | Category: Known Malicious Patterns | Confidence threshold: 40% | Platforms: All

Detects multi-layer base64 encoding used to hide malicious payloads

Remediation:

No remediation guidance available.


Severity: 🔴 Critical | Category: Known Malicious Patterns | Confidence threshold: 40% | Platforms: All

Detects classic reverse shell byte patterns across languages

Remediation:

No remediation guidance available.


Severity: 🔴 Critical | Category: Known Malicious Patterns | Confidence threshold: 40% | Platforms: All

Detects combined credential access + exfiltration patterns

Remediation:

No remediation guidance available.


Severity: 🔴 Critical | Category: Known Malicious Patterns | Confidence threshold: 40% | Platforms: All

Detects remote access trojan and backdoor communication patterns

Remediation:

No remediation guidance available.


Severity: 🟠 High | Category: Known Malicious Patterns | Confidence threshold: 30% | Platforms: openclaw

Content authored by a known malicious actor who has published 40+ confirmed malicious skills

Remediation:

Skills by this author should be treated as malicious. Remove immediately and audit your system for compromise.


mal-updater-001 — Fake Auto-Updater Skill

Section titled “mal-updater-001 — Fake Auto-Updater Skill”

Severity: 🟠 High | Category: Known Malicious Patterns | Confidence threshold: 40% | Platforms: openclaw

Detects skills masquerading as auto-updaters, a common malware delivery mechanism

Remediation:

Legitimate AI skills do not auto-update themselves. This is likely a malware delivery mechanism. Remove immediately.


Severity: 🟠 High | Category: Known Malicious Patterns | Confidence threshold: 40% | Platforms: All

Detects cryptocurrency mining code and configuration patterns

Remediation:

No remediation guidance available.


IDNameSeverityConfidencePlatforms
malware-002Password-Protected Archive Extraction🔴 Critical50%All
malware-003Base64-Encoded Command Execution🔴 Critical50%All
malware-004Remote Script Piping🔴 Critical40%All
malware-001Remote Archive Download🟠 High60%All
malware-005System Service Manipulation🟠 High60%All
malware-006Fake Prerequisite Installation Instructions🟡 Medium60%All

malware-002 — Password-Protected Archive Extraction

Section titled “malware-002 — Password-Protected Archive Extraction”

Severity: 🔴 Critical | Category: Malware Distribution | Confidence threshold: 50% | Platforms: All

Extracts password-protected archives — used to evade static analysis

Remediation:

Password-protected archives are commonly used to evade antivirus and static analysis. This is highly suspicious in an AI agent context.


malware-003 — Base64-Encoded Command Execution

Section titled “malware-003 — Base64-Encoded Command Execution”

Severity: 🔴 Critical | Category: Malware Distribution | Confidence threshold: 50% | Platforms: All

Executes base64-encoded commands — used to obfuscate malicious payloads

Remediation:

Base64-encoded execution is a classic obfuscation technique. Decode and review the payload before allowing this skill.


Severity: 🔴 Critical | Category: Malware Distribution | Confidence threshold: 40% | Platforms: All

Pipes remote content directly to shell execution — classic malware delivery

Remediation:

Never pipe remote content directly to a shell interpreter. Download, verify, then execute separately.


Severity: 🟠 High | Category: Malware Distribution | Confidence threshold: 60% | Platforms: All

Downloads archive files from GitHub releases or remote URLs — common malware delivery vector

Remediation:

Downloading archives from remote URLs is a common malware delivery technique. Verify the source and use package managers instead.


malware-005 — System Service Manipulation

Section titled “malware-005 — System Service Manipulation”

Severity: 🟠 High | Category: Malware Distribution | Confidence threshold: 60% | Platforms: All

Modifies system services or daemons — potential persistence mechanism

Remediation:

AI agent skills should not manipulate system services. This may indicate a persistence mechanism.


malware-006 — Fake Prerequisite Installation Instructions

Section titled “malware-006 — Fake Prerequisite Installation Instructions”

Severity: 🟡 Medium | Category: Malware Distribution | Confidence threshold: 60% | Platforms: All

Skill documentation instructs users to run suspicious installation commands

Remediation:

Review installation instructions carefully. Legitimate skills should not require manual downloads from unknown sources.


IDNameSeverityConfidencePlatforms
na-007Reverse Shell Patterns🔴 Critical60%All
net-001Bind Shell🔴 Critical60%All
na-006DNS Exfiltration via Long Subdomain Queries🟠 High55%All
na-008Cryptocurrency Mining Endpoints🟠 High60%All
net-002Raw Socket Creation🟠 High65%All
net-003SSH Tunneling🟠 High60%All
net-005DNS Covert Channel🟠 High60%All
na-009Tor Network and Anonymizing Proxy Connections🟡 Medium55%All
net-004Proxy and Tor Usage🟡 Medium65%All
na-010Non-Standard Port Usage for HTTP/HTTPS🟢 Low45%All

Severity: 🔴 Critical | Category: Network Abuse | Confidence threshold: 60% | Platforms: All

Detects reverse shell one-liners that connect back to an attacker-controlled host, providing interactive shell access

Remediation:

Reverse shells provide attackers with interactive command execution on compromised systems. These are unambiguous attack payloads — no legitimate use case exists for reverse shell one-liners in agent code. Remove immediately and investigate the source of this code.

References:


Severity: 🔴 Critical | Category: Network Abuse | Confidence threshold: 60% | Platforms: All

Detects server-side bind shell patterns that open a listening port for incoming attacker connections

Remediation:

Bind shells open a network listener that an attacker can connect to directly. AI agents should never create raw TCP listeners. Remove all socket.bind/listen and net.createServer patterns unless they are part of a documented, sandboxed service with explicit user consent.


na-006 — DNS Exfiltration via Long Subdomain Queries

Section titled “na-006 — DNS Exfiltration via Long Subdomain Queries”

Severity: 🟠 High | Category: Network Abuse | Confidence threshold: 55% | Platforms: All

Detects patterns of DNS exfiltration where data is encoded into unusually long subdomain labels to bypass network monitoring

Remediation:

DNS exfiltration encodes stolen data as subdomains of attacker-controlled domains. Each DNS query carries a fragment of exfiltrated content that bypasses HTTP/HTTPS monitoring. Implement DNS monitoring and block queries with unusually long labels. AI agents must not construct or resolve dynamically-encoded DNS queries.

References:


na-008 — Cryptocurrency Mining Endpoints

Section titled “na-008 — Cryptocurrency Mining Endpoints”

Severity: 🟠 High | Category: Network Abuse | Confidence threshold: 60% | Platforms: All

Detects connections to known cryptocurrency mining pool endpoints and mining-related protocol patterns

Remediation:

Cryptocurrency mining in agent environments consumes unauthorized compute resources and may indicate a broader supply-chain compromise. Remove all mining software, pool connections, and mining algorithm references. Investigate how this code was introduced.

References:


Severity: 🟠 High | Category: Network Abuse | Confidence threshold: 65% | Platforms: All

Detects creation of raw network sockets that bypass normal OS protocol stacks, enabling packet crafting and sniffing

Remediation:

Raw sockets allow crafting arbitrary network packets and capturing all traffic on an interface. This capability is not required by legitimate AI agents. Remove raw socket usage and use higher-level network APIs instead.


Severity: 🟠 High | Category: Network Abuse | Confidence threshold: 60% | Platforms: All

Detects SSH-based tunneling and port-forwarding patterns used to bypass firewalls or exfiltrate data covertly

Remediation:

SSH tunneling can be used to bypass network controls, exfiltrate data, or grant reverse access to internal systems. AI agents should not establish SSH port-forwards or tunnels. Remove these patterns entirely.


Severity: 🟠 High | Category: Network Abuse | Confidence threshold: 60% | Platforms: All

Detects DNS-over-HTTPS used as a covert communication channel and DNS tunneling tools that encode data in DNS queries

Remediation:

DNS covert channels encode data in DNS query subdomains or use DoH endpoints to bypass firewalls while exfiltrating data or maintaining C2 communication. AI agents should not use DNS-over-HTTPS programmatically or invoke DNS tunneling tools. Remove all such patterns and use standard HTTPS APIs instead.


na-009 — Tor Network and Anonymizing Proxy Connections

Section titled “na-009 — Tor Network and Anonymizing Proxy Connections”

Severity: 🟡 Medium | Category: Network Abuse | Confidence threshold: 55% | Platforms: All

Detects .onion domain connections and Tor/proxy configurations used to anonymize malicious network activity

Remediation:

Tor and .onion connections are used to anonymize communication with C2 servers and exfiltrate data beyond network monitoring. AI agents must use direct, auditable connections only. Remove all Tor proxy configurations and .onion references.

References:


Severity: 🟡 Medium | Category: Network Abuse | Confidence threshold: 65% | Platforms: All

Detects use of SOCKS proxies, proxy chaining tools, and the Tor network to anonymize or reroute network traffic

Remediation:

Proxy and Tor usage in agent code can be used to anonymize malicious activity or bypass network monitoring. AI agents should use direct connections only. Remove SOCKS proxy configuration and Tor-related dependencies.


na-010 — Non-Standard Port Usage for HTTP/HTTPS

Section titled “na-010 — Non-Standard Port Usage for HTTP/HTTPS”

Severity: 🟢 Low | Category: Network Abuse | Confidence threshold: 45% | Platforms: All

Detects HTTP or HTTPS traffic on non-standard ports, commonly used to bypass firewall rules and evade traffic inspection

Remediation:

Non-standard ports are frequently used to evade port-based firewall rules and network monitoring configured for standard ports (80, 443). Review all network connections using non-standard ports to ensure they are documented and authorized.

References:


IDNameSeverityConfidencePlatforms
perm-002Maximum Blast Radius Permission Combo🔴 Critical60%openclaw
po-005Agent Filesystem Write to Sensitive Directories🔴 Critical60%All
perm-001Wildcard Permission🟠 High50%openclaw
po-004MCP Server Wildcard Tool Permissions🟠 High55%mcp, claude, openclaw
po-007Allow-All Network Policy🟠 High55%All
perm-003Dangerous Tool Declarations🟡 Medium50%openclaw
po-006Overly Broad CORS Configuration🟡 Medium55%All

perm-002 — Maximum Blast Radius Permission Combo

Section titled “perm-002 — Maximum Blast Radius Permission Combo”

Severity: 🔴 Critical | Category: Permission Overgrant | Confidence threshold: 60% | Platforms: openclaw

Skill requests shell + network + filesystem permissions — maximum attack surface

Remediation:

Skills with shell + network + filesystem access can exfiltrate any data. This combination should be carefully reviewed.


po-005 — Agent Filesystem Write to Sensitive Directories

Section titled “po-005 — Agent Filesystem Write to Sensitive Directories”

Severity: 🔴 Critical | Category: Permission Overgrant | Confidence threshold: 60% | Platforms: All

Detects agent configurations or code requesting write access to sensitive system directories like /etc, /root, or ~/.ssh

Remediation:

Agents must not write to system directories (/etc, /root, /boot, ~/.ssh). Confine filesystem write permissions to the application’s own data directory. Use explicit path allowlists, never path-prefix grants to system locations.

References:


Severity: 🟠 High | Category: Permission Overgrant | Confidence threshold: 50% | Platforms: openclaw

Skill requests wildcard permissions granting unrestricted access

Remediation:

Avoid wildcard permissions. Request only the specific permissions needed (e.g., shell:read, filesystem:home).


po-004 — MCP Server Wildcard Tool Permissions

Section titled “po-004 — MCP Server Wildcard Tool Permissions”

Severity: 🟠 High | Category: Permission Overgrant | Confidence threshold: 55% | Platforms: mcp, claude, openclaw

Detects MCP server configurations that request wildcard or all-tools permissions, granting unrestricted tool access

Remediation:

MCP servers must declare the minimum set of tools required. Wildcard tool permissions grant agents access to every registered tool, including dangerous ones. Enumerate the specific tools needed explicitly.

References:


Severity: 🟠 High | Category: Permission Overgrant | Confidence threshold: 55% | Platforms: All

Detects network policies or firewall rules that permit all inbound or outbound traffic, removing network isolation

Remediation:

Allow-all network policies remove critical isolation for agent environments. Define explicit allowlists for permitted endpoints and ports. Apply zero-trust network principles: deny by default, allow by exception.

References:


Severity: 🟡 Medium | Category: Permission Overgrant | Confidence threshold: 50% | Platforms: openclaw

Skill declares tools that provide excessive system access

Remediation:

Minimize tool access in skill declarations. Use the most restrictive tools that accomplish the task.


po-006 — Overly Broad CORS Configuration

Section titled “po-006 — Overly Broad CORS Configuration”

Severity: 🟡 Medium | Category: Permission Overgrant | Confidence threshold: 55% | Platforms: All

Detects CORS policies that allow all origins, enabling cross-origin attacks on agent APIs

Remediation:

CORS wildcard (Access-Control-Allow-Origin: *) allows any website to make cross-origin requests to your agent API, enabling data theft and CSRF attacks. Restrict allowed origins to an explicit allowlist of trusted domains.

References:


IDNameSeverityConfidencePlatforms
privesc-001Sudo/Root Command Execution🔴 Critical85%All
privesc-002Process Injection Patterns🔴 Critical90%All
privesc-004Setuid/Capability Manipulation🔴 Critical85%All
privesc-007Kernel Module Loading🔴 Critical90%All
privesc-009Container Escape Patterns🔴 Critical85%All
privesc-003Shell Escape Sequences🟠 High80%All
privesc-005Cron/Scheduled Task Manipulation🟠 High80%All
privesc-006Service/Daemon Manipulation🟠 High80%All
privesc-010Debugger Attachment🟠 High80%All
privesc-008Environment Path Manipulation🟡 Medium70%All

privesc-001 — Sudo/Root Command Execution

Section titled “privesc-001 — Sudo/Root Command Execution”

Severity: 🔴 Critical | Category: Privilege Escalation | Confidence threshold: 85% | Platforms: All

Detects attempts to execute commands with elevated privileges

Remediation:

AI agents should never execute commands with elevated privileges. Remove sudo/su usage.


privesc-002 — Process Injection Patterns

Section titled “privesc-002 — Process Injection Patterns”

Severity: 🔴 Critical | Category: Privilege Escalation | Confidence threshold: 90% | Platforms: All

Detects process injection or DLL injection patterns

Remediation:

Process injection is a serious security concern. This should never be in an AI agent.


privesc-004 — Setuid/Capability Manipulation

Section titled “privesc-004 — Setuid/Capability Manipulation”

Severity: 🔴 Critical | Category: Privilege Escalation | Confidence threshold: 85% | Platforms: All

Detects attempts to modify file permissions or capabilities

Remediation:

File permission and capability manipulation can lead to privilege escalation. Remove these.


Severity: 🔴 Critical | Category: Privilege Escalation | Confidence threshold: 90% | Platforms: All

Detects attempts to load kernel modules

Remediation:

Kernel module manipulation is extremely dangerous. This should never be in an AI agent.


Severity: 🔴 Critical | Category: Privilege Escalation | Confidence threshold: 85% | Platforms: All

Detects attempts to escape container environments

Remediation:

Container escape attempts are critical security issues. Remove these patterns.


Severity: 🟠 High | Category: Privilege Escalation | Confidence threshold: 80% | Platforms: All

Detects attempts to escape restricted shells

Remediation:

Remove shell escape patterns. These attempt to break out of restricted environments.


privesc-005 — Cron/Scheduled Task Manipulation

Section titled “privesc-005 — Cron/Scheduled Task Manipulation”

Severity: 🟠 High | Category: Privilege Escalation | Confidence threshold: 80% | Platforms: All

Detects modification of scheduled tasks

Remediation:

Scheduled task modification should not be performed by AI agents without explicit permission.


privesc-006 — Service/Daemon Manipulation

Section titled “privesc-006 — Service/Daemon Manipulation”

Severity: 🟠 High | Category: Privilege Escalation | Confidence threshold: 80% | Platforms: All

Detects attempts to modify system services

Remediation:

System service manipulation requires careful review. Ensure this is intended behavior.


Severity: 🟠 High | Category: Privilege Escalation | Confidence threshold: 80% | Platforms: All

Detects attempts to attach debuggers to processes

Remediation:

Debugger attachment can be used for privilege escalation. Review this carefully.


privesc-008 — Environment Path Manipulation

Section titled “privesc-008 — Environment Path Manipulation”

Severity: 🟡 Medium | Category: Privilege Escalation | Confidence threshold: 70% | Platforms: All

Detects PATH or library path manipulation

Remediation:

PATH manipulation can lead to binary hijacking. Review environment variable changes.


IDNameSeverityConfidencePlatforms
prompt-001Instruction Override in Tool Description🟠 High75%All
prompt-002System Prompt Extraction🟠 High80%All
prompt-004Hidden Instructions in Unicode🟠 High85%All
prompt-009Recursive Prompt Injection🟠 High80%All
prompt-012Non-Latin Override Instructions🟠 High60%All
prompt-013Unicode Tag Characters🟠 High70%All
prompt-003Role Manipulation🟡 Medium70%All
prompt-005Delimiter Injection🟡 Medium70%All
prompt-006Encoded Instruction Injection🟡 Medium75%All
prompt-007Context Manipulation🟡 Medium70%All
prompt-010Markdown/HTML Injection🟡 Medium70%All
prompt-011Homoglyph Mixed-Script Attack🟡 Medium50%All
prompt-008Output Format Manipulation🟢 Low65%All

prompt-001 — Instruction Override in Tool Description

Section titled “prompt-001 — Instruction Override in Tool Description”

Severity: 🟠 High | Category: Prompt Injection | Confidence threshold: 75% | Platforms: All

Detects prompt injection patterns in tool/skill descriptions

Remediation:

Remove instruction override patterns from descriptions. These are prompt injection attempts.


Severity: 🟠 High | Category: Prompt Injection | Confidence threshold: 80% | Platforms: All

Detects attempts to extract system prompts

Remediation:

Remove prompt extraction attempts. These try to reveal confidential instructions.


prompt-004 — Hidden Instructions in Unicode

Section titled “prompt-004 — Hidden Instructions in Unicode”

Severity: 🟠 High | Category: Prompt Injection | Confidence threshold: 85% | Platforms: All

Detects hidden instructions using Unicode tricks

Remediation:

Remove invisible Unicode characters. These may hide malicious instructions.


Severity: 🟠 High | Category: Prompt Injection | Confidence threshold: 80% | Platforms: All

Detects prompts designed to inject into future contexts

Remediation:

Remove recursive injection patterns. These attempt to persist malicious instructions.


prompt-012 — Non-Latin Override Instructions

Section titled “prompt-012 — Non-Latin Override Instructions”

Severity: 🟠 High | Category: Prompt Injection | Confidence threshold: 60% | Platforms: All

Detects override keywords combined with non-Latin script characters

Remediation:

Remove override instructions combined with non-Latin text. This is a multi-lingual injection technique to bypass Latin-only filters.


Severity: 🟠 High | Category: Prompt Injection | Confidence threshold: 70% | Platforms: All

Detects Unicode tag characters (U+E0001-U+E007F) used to hide invisible markup

Remediation:

Remove Unicode tag characters. These are invisible characters that can hide malicious instructions.


Severity: 🟡 Medium | Category: Prompt Injection | Confidence threshold: 70% | Platforms: All

Detects attempts to change AI behavior through role play

Remediation:

Remove role manipulation patterns. These attempt to bypass AI safety measures.


Severity: 🟡 Medium | Category: Prompt Injection | Confidence threshold: 70% | Platforms: All

Detects attempts to break out of delimiters

Remediation:

Remove fake delimiters that attempt to inject system-level instructions.


prompt-006 — Encoded Instruction Injection

Section titled “prompt-006 — Encoded Instruction Injection”

Severity: 🟡 Medium | Category: Prompt Injection | Confidence threshold: 75% | Platforms: All

Detects encoded or obfuscated instructions

Remediation:

Remove encoded instructions. These attempt to bypass content filtering.


Severity: 🟡 Medium | Category: Prompt Injection | Confidence threshold: 70% | Platforms: All

Detects attempts to manipulate conversation context

Remediation:

Remove context manipulation attempts. These try to mislead the AI about user intent.


Severity: 🟡 Medium | Category: Prompt Injection | Confidence threshold: 70% | Platforms: All

Detects attempts to inject via markdown or HTML

Remediation:

Sanitize markdown and HTML content. These may execute malicious code.


prompt-011 — Homoglyph Mixed-Script Attack

Section titled “prompt-011 — Homoglyph Mixed-Script Attack”

Severity: 🟡 Medium | Category: Prompt Injection | Confidence threshold: 50% | Platforms: All

Detects Cyrillic/Greek/Armenian characters mixed with Latin text (homoglyph attacks)

Remediation:

Remove mixed-script text. Homoglyph attacks use visually identical characters from different scripts to bypass filters.


Severity: 🟢 Low | Category: Prompt Injection | Confidence threshold: 65% | Platforms: All

Detects attempts to control AI output format maliciously

Remediation:

Review output format instructions. Some may attempt to suppress safety warnings.


IDNameSeverityConfidencePlatforms
sec-007Stripe Live Secret Key🔴 Critical55%All
sec-009Stripe Restricted Key🔴 Critical55%All
sec-010Square Application Secret🔴 Critical60%All
sec-011PayPal / Braintree Credentials🔴 Critical60%All
sec-035HashiCorp Vault Token🔴 Critical60%All
sec-037Cloudflare API Token and Key🔴 Critical60%All
sec-038Base64-Encoded Private Key🔴 Critical70%All
sec-056Supabase Service Role Key (Inline)🔴 Critical55%All
sec-001Azure Storage Account Key🟠 High70%All
sec-002Azure SAS Token🟠 High65%All
sec-003Azure Active Directory Client Secret🟠 High60%All
sec-004Azure Subscription Key (Cognitive Services / API Management)🟠 High65%All
sec-005Alibaba Cloud Access Key🟠 High70%All
sec-006IBM Cloud API Key🟠 High70%All
sec-008Stripe Live Publishable Key🟠 High60%All
sec-012Twilio Account SID and Auth Token🟠 High65%All
sec-013SendGrid API Key🟠 High60%All
sec-014Mailgun API Key🟠 High65%All
sec-016Postmark Server Token🟠 High65%All
sec-017Heroku API Key🟠 High65%All
sec-018DigitalOcean Personal Access Token🟠 High60%All
sec-019Terraform Cloud Token🟠 High65%All
sec-021CircleCI API Token🟠 High65%All
sec-022Travis CI API Token🟠 High65%All
sec-024Vercel API Token🟠 High60%All
sec-025Discord Bot Token🟠 High65%All
sec-027Twitch API Credentials🟠 High65%All
sec-028Telegram Bot Token🟠 High65%All
sec-029Facebook / Meta App Secret🟠 High60%All
sec-030Firebase API Key🟠 High60%All
sec-031Algolia Admin API Key🟠 High65%All
sec-034Datadog API and Application Keys🟠 High65%All
sec-036Consul ACL Token🟠 High65%All
sec-039Hardcoded JWT Token🟠 High55%All
sec-041Generic Secret in URL Query Parameter🟠 High70%All
sec-045Shopify Access Token🟠 High65%All
sec-046Okta API Token🟠 High65%All
sec-048Elastic Cloud API Key🟠 High65%All
sec-052Pinecone API Key🟠 High65%All
sec-053Cohere API Key🟠 High65%All
sec-054Hugging Face Token🟠 High60%All
sec-055Replicate API Token🟠 High65%All
sec-015Mailchimp API Key🟡 Medium65%All
sec-020Sentry DSN🟡 Medium70%All
sec-023Codecov Upload Token🟡 Medium65%All
sec-026Discord Webhook URL🟡 Medium70%All
sec-032Segment Write Key🟡 Medium65%All
sec-033Mixpanel Token and Secret🟡 Medium65%All
sec-040Generic API Key Assignment🟡 Medium75%All
sec-042High-Entropy Hex String Assigned to Secret Variable🟡 Medium75%All
sec-043PagerDuty Integration Key🟡 Medium65%All
sec-044Zendesk API Token🟡 Medium65%All
sec-047Atlassian API Token🟡 Medium65%All
sec-049Airtable API Key🟡 Medium65%All
sec-050Linear API Key🟡 Medium65%All
sec-051Notion Integration Token🟡 Medium65%All
sec-057Pusher Application Secret🟡 Medium65%All
sec-058Amplitude API Key and Secret🟡 Medium65%All
sec-059Mapbox Access Token🟡 Medium65%All
sec-060Intercom Access Token🟡 Medium65%All

Severity: 🔴 Critical | Category: Secret Detection | Confidence threshold: 55% | Platforms: All

Detects Stripe live-mode secret API keys which allow full account access

Remediation:

This is a critical incident. A Stripe live secret key can create charges, access customer data, and perform refunds. Immediately:

  1. Roll the key in the Stripe dashboard (Developers > API keys)
  2. Audit recent API calls for unauthorized activity
  3. Store keys exclusively in environment variables or a secrets manager

Severity: 🔴 Critical | Category: Secret Detection | Confidence threshold: 55% | Platforms: All

Detects Stripe restricted API keys

Remediation:

Roll the restricted key immediately in the Stripe dashboard (Developers > API keys). Even restricted keys can perform sensitive operations within their scope. Store all Stripe keys in a secrets manager, never in source code.


Severity: 🔴 Critical | Category: Secret Detection | Confidence threshold: 60% | Platforms: All

Detects Square OAuth application secrets and access tokens

Remediation:

Revoke the exposed Square credential immediately in the Square Developer dashboard under OAuth > Applications. Square application secrets can be used to impersonate your application. Rotate and store exclusively in a secrets manager or environment variables.


sec-011 — PayPal / Braintree Credentials

Section titled “sec-011 — PayPal / Braintree Credentials”

Severity: 🔴 Critical | Category: Secret Detection | Confidence threshold: 60% | Platforms: All

Detects PayPal REST API client secrets and Braintree tokens

Remediation:

Revoke PayPal/Braintree credentials immediately in their respective dashboards. These credentials can process financial transactions. Use environment variables or a secrets manager and enforce secret scanning on your repositories.


Severity: 🔴 Critical | Category: Secret Detection | Confidence threshold: 60% | Platforms: All

Detects Vault service tokens and batch tokens used for secrets access

Remediation:

Revoke the Vault token immediately using vault token revoke <token> or via the Vault UI. Vault tokens can access any secret in their policy scope. Use short-TTL tokens, AppRole authentication, or Kubernetes auth instead of static tokens.


Severity: 🔴 Critical | Category: Secret Detection | Confidence threshold: 60% | Platforms: All

Detects Cloudflare API tokens and global API keys

Remediation:

Revoke the Cloudflare token in My Profile > API Tokens. Cloudflare global API keys have access to your entire account including DNS, WAF, and Workers. Use scoped API tokens (not the global key) and grant only the permissions required for the specific use case.


Severity: 🔴 Critical | Category: Secret Detection | Confidence threshold: 70% | Platforms: All

Detects base64-encoded PEM private keys used to obfuscate credentials

Remediation:

A base64-encoded private key is just as sensitive as the raw PEM key. Remove it from code immediately, rotate the key pair, and use a secrets manager or environment variable to provide keys at runtime. Encoding is not encryption and provides no security benefit.


sec-056 — Supabase Service Role Key (Inline)

Section titled “sec-056 — Supabase Service Role Key (Inline)”

Severity: 🔴 Critical | Category: Secret Detection | Confidence threshold: 55% | Platforms: All

Detects full Supabase service role JWT tokens hardcoded inline

Remediation:

The Supabase service role key bypasses Row Level Security on all tables. Rotate it immediately in the Supabase dashboard under Settings > API. Never expose it in client-side code or commit it to version control. Use the anon key for client-side access and apply strict RLS policies.


Severity: 🟠 High | Category: Secret Detection | Confidence threshold: 70% | Platforms: All

Detects Azure Storage account access keys embedded in code or config

Remediation:

Never hardcode Azure Storage keys. Use managed identities, Azure Key Vault, or environment variables instead:

  • Assign the Storage Blob Data Contributor role to your managed identity
  • Reference secrets via Key Vault references in App Service configuration
  • Rotate the exposed key immediately in the Azure portal

Severity: 🟠 High | Category: Secret Detection | Confidence threshold: 65% | Platforms: All

Detects Azure Shared Access Signature tokens which grant time-limited storage access

Remediation:

SAS tokens provide direct access to Azure resources. If exposed:

  • Revoke the SAS token by regenerating the storage account key it was derived from
  • Use short-lived SAS tokens generated server-side on demand
  • Prefer managed identities over SAS tokens for service-to-service access

sec-003 — Azure Active Directory Client Secret

Section titled “sec-003 — Azure Active Directory Client Secret”

Severity: 🟠 High | Category: Secret Detection | Confidence threshold: 60% | Platforms: All

Detects Azure AD application client secrets used for service principal authentication

Remediation:

Rotate the Azure AD client secret immediately in the Azure portal under App Registrations > Certificates & secrets. Switch to certificate-based authentication or managed identities to avoid secret rotation entirely.


sec-004 — Azure Subscription Key (Cognitive Services / API Management)

Section titled “sec-004 — Azure Subscription Key (Cognitive Services / API Management)”

Severity: 🟠 High | Category: Secret Detection | Confidence threshold: 65% | Platforms: All

Detects Azure API Management or Cognitive Services subscription keys

Remediation:

Regenerate the exposed subscription key in Azure API Management or Cognitive Services. Use Azure Key Vault to store and retrieve keys at runtime rather than embedding them in source or config files.


Severity: 🟠 High | Category: Secret Detection | Confidence threshold: 70% | Platforms: All

Detects Alibaba Cloud (Aliyun) access key IDs and secrets

Remediation:

Revoke the exposed Alibaba Cloud access key in the RAM console immediately. Use RAM roles with STS temporary credentials or instance RAM roles instead of long-lived access key pairs.


Severity: 🟠 High | Category: Secret Detection | Confidence threshold: 70% | Platforms: All

Detects IBM Cloud IAM API keys

Remediation:

Revoke the IBM Cloud API key in the IAM console (Manage > Access > API keys). Use service IDs with IAM policies scoped to the minimum required permissions and generate keys via the API rather than storing static keys.


Severity: 🟠 High | Category: Secret Detection | Confidence threshold: 60% | Platforms: All

Detects Stripe live-mode publishable keys which can be used to initiate payments

Remediation:

While publishable keys are designed for client-side use, they should not appear in server-side secrets files or VCS history. If the corresponding secret key is also exposed, treat this as a critical incident. Roll both keys in the Stripe dashboard.


sec-012 — Twilio Account SID and Auth Token

Section titled “sec-012 — Twilio Account SID and Auth Token”

Severity: 🟠 High | Category: Secret Detection | Confidence threshold: 65% | Platforms: All

Detects Twilio account credentials which enable SMS/voice actions and billing

Remediation:

Rotate the Twilio auth token immediately in the Twilio Console under Account > General Settings. Auth tokens can send SMS/calls charged to your account. Use API Keys (more limited scope) instead of auth tokens where possible.


Severity: 🟠 High | Category: Secret Detection | Confidence threshold: 60% | Platforms: All

Detects SendGrid email API keys which allow sending emails on your behalf

Remediation:

Delete the exposed SendGrid API key immediately in Settings > API Keys. Create a replacement key with the minimum required permissions (e.g., Mail Send only). Store in environment variables or a secrets manager.


Severity: 🟠 High | Category: Secret Detection | Confidence threshold: 65% | Platforms: All

Detects Mailgun email service API keys

Remediation:

Rotate the Mailgun API key in the Mailgun Control Panel under Settings > API Keys. Use domain-level sending keys rather than the primary account API key to limit the blast radius of a leak.


Severity: 🟠 High | Category: Secret Detection | Confidence threshold: 65% | Platforms: All

Detects Postmark transactional email server API tokens

Remediation:

Regenerate the Postmark server token in the Postmark app under Servers > API Tokens. Use separate tokens per environment and store in a secrets manager.


Severity: 🟠 High | Category: Secret Detection | Confidence threshold: 65% | Platforms: All

Detects Heroku platform API keys which allow full account management

Remediation:

Revoke the Heroku API key in Account Settings > API Key. Heroku API keys grant full control over all your apps and pipelines. Use OAuth tokens with limited scopes for CI/CD automation instead.


sec-018 — DigitalOcean Personal Access Token

Section titled “sec-018 — DigitalOcean Personal Access Token”

Severity: 🟠 High | Category: Secret Detection | Confidence threshold: 60% | Platforms: All

Detects DigitalOcean API tokens for infrastructure management

Remediation:

Delete the token in DigitalOcean API Settings and generate a new one with read-only or scoped access. DigitalOcean tokens with write access can create/destroy Droplets and databases.


Severity: 🟠 High | Category: Secret Detection | Confidence threshold: 65% | Platforms: All

Detects Terraform Cloud / Enterprise API tokens

Remediation:

Revoke the token in Terraform Cloud under User/Organization Settings > Tokens. Terraform tokens can apply infrastructure changes. Use short-lived tokens and machine users (team tokens) for CI pipelines rather than personal tokens.


Severity: 🟠 High | Category: Secret Detection | Confidence threshold: 65% | Platforms: All

Detects CircleCI personal or project API tokens

Remediation:

Delete the CircleCI personal API token in User Settings > Personal API Tokens. CircleCI tokens with project access can trigger pipelines and read secrets. Use project-scoped tokens and rotate them regularly.


Severity: 🟠 High | Category: Secret Detection | Confidence threshold: 65% | Platforms: All

Detects Travis CI authentication tokens

Remediation:

Regenerate the Travis CI token in Profile > Settings > API Authentication. Ensure Travis CI environment variables containing secrets are marked as hidden and not displayed in build logs.


Severity: 🟠 High | Category: Secret Detection | Confidence threshold: 60% | Platforms: All

Detects Vercel deployment and management API tokens

Remediation:

Delete the Vercel token in Account Settings > Tokens. Vercel tokens can deploy code and manage projects. Use team-scoped tokens with the minimum required access level for CI/CD pipelines.


Severity: 🟠 High | Category: Secret Detection | Confidence threshold: 65% | Platforms: All

Detects Discord bot tokens which allow full bot account control

Remediation:

Reset the bot token immediately in the Discord Developer Portal under Applications > Bot > Reset Token. Anyone with the token can act as your bot, join servers, and send messages. Rotate and store in environment variables only.


Severity: 🟠 High | Category: Secret Detection | Confidence threshold: 65% | Platforms: All

Detects Twitch application client secrets and OAuth tokens

Remediation:

Revoke the Twitch application secret in the Twitch Developer Console. OAuth tokens should be treated as passwords and stored only in secure server-side secret stores.


Severity: 🟠 High | Category: Secret Detection | Confidence threshold: 65% | Platforms: All

Detects Telegram bot API tokens issued by BotFather

Remediation:

Request a new token from Telegram’s BotFather using /revoke. Anyone with the bot token can read all messages sent to the bot and send messages as it. Never commit bot tokens to version control.


Severity: 🟠 High | Category: Secret Detection | Confidence threshold: 60% | Platforms: All

Detects Facebook/Meta application secrets and access tokens

Remediation:

Rotate the Facebook app secret in the Meta Developer Console under App Settings > Basic. App secrets can generate user access tokens and make server-side API calls. Treat them as passwords and never expose them in client-side code.


Severity: 🟠 High | Category: Secret Detection | Confidence threshold: 60% | Platforms: All

Detects Firebase project configuration API keys and service account credentials

Remediation:

Firebase Web API keys are intended for client-side use but should be restricted in the Google Cloud Console to specific HTTP referrers or IP addresses. For server-side access, use Firebase Admin SDK with a service account and store the private key in a secrets manager. Restrict Firebase security rules to prevent unauthorized database/storage access.


Severity: 🟠 High | Category: Secret Detection | Confidence threshold: 65% | Platforms: All

Detects Algolia admin API keys which provide full index management access

Remediation:

Rotate the Algolia admin key in API Keys settings. The admin key can add, delete, and modify all records and indices. Use search-only or restricted API keys for client-side use, and never expose admin keys in frontend code.


sec-034 — Datadog API and Application Keys

Section titled “sec-034 — Datadog API and Application Keys”

Severity: 🟠 High | Category: Secret Detection | Confidence threshold: 65% | Platforms: All

Detects Datadog API keys and application keys for monitoring access

Remediation:

Revoke and regenerate keys in Datadog Organization Settings > API Keys. Datadog application keys have broad read/write access to metrics, logs, and monitors. Use scoped API keys and rotate them on a schedule.


Severity: 🟠 High | Category: Secret Detection | Confidence threshold: 65% | Platforms: All

Detects HashiCorp Consul access control list tokens

Remediation:

Revoke the Consul ACL token via the Consul API or UI. Consul tokens control access to service discovery and KV store. Rotate bootstrap tokens immediately and use scoped service tokens for application access.


Severity: 🟠 High | Category: Secret Detection | Confidence threshold: 55% | Platforms: All

Detects live JWT tokens hardcoded in source code

Remediation:

JWTs contain identity and authorization claims. A hardcoded JWT is valid until it expires or the signing key is rotated. Identify the issuer from the decoded payload, revoke or invalidate the token if possible, and rotate the JWT signing secret/key immediately.


sec-041 — Generic Secret in URL Query Parameter

Section titled “sec-041 — Generic Secret in URL Query Parameter”

Severity: 🟠 High | Category: Secret Detection | Confidence threshold: 70% | Platforms: All

Detects secrets embedded directly in URL query strings

Remediation:

Never pass secrets as URL query parameters. They are logged by web servers, proxies, and browsers. Use HTTP Authorization headers or POST body instead. Rotate any exposed secrets immediately.


Severity: 🟠 High | Category: Secret Detection | Confidence threshold: 65% | Platforms: All

Detects Shopify private app and OAuth access tokens

Remediation:

Revoke the Shopify token in Partners > Apps or in the store admin under Apps > App and sales channel settings. Shopify tokens can read/write orders, customers, and inventory. Rotate immediately if exposed.


Severity: 🟠 High | Category: Secret Detection | Confidence threshold: 65% | Platforms: All

Detects Okta identity platform API tokens

Remediation:

Revoke the Okta API token in Security > API > Tokens. Okta tokens with admin privileges can manage users and applications. Use OAuth 2.0 service apps instead of SSWS tokens for non-human access.


Severity: 🟠 High | Category: Secret Detection | Confidence threshold: 65% | Platforms: All

Detects Elasticsearch/Elastic Cloud API keys and credentials

Remediation:

Invalidate the API key via the Elasticsearch API: DELETE /_security/api_key with the key ID. Create replacement keys with minimal index privileges and source IP restrictions where possible.


Severity: 🟠 High | Category: Secret Detection | Confidence threshold: 65% | Platforms: All

Detects Pinecone vector database API keys

Remediation:

Revoke the Pinecone API key in the Pinecone console under API Keys. Pinecone keys can upsert, query, and delete vector embeddings. Rotate immediately and store replacements in environment variables or a secrets manager.


Severity: 🟠 High | Category: Secret Detection | Confidence threshold: 65% | Platforms: All

Detects Cohere AI API keys for NLP model access

Remediation:

Revoke the Cohere API key in the Cohere dashboard under API Keys. API keys can be used to invoke paid LLM endpoints. Create a new key and store it exclusively in environment variables or a secrets manager.


Severity: 🟠 High | Category: Secret Detection | Confidence threshold: 60% | Platforms: All

Detects Hugging Face user access tokens for model hub and inference API

Remediation:

Revoke the token in Hugging Face Account Settings > Access Tokens. Tokens with write access can modify model repositories and datasets. Use read-only tokens for inference workloads and store in a secrets manager.


Severity: 🟠 High | Category: Secret Detection | Confidence threshold: 65% | Platforms: All

Detects Replicate AI inference platform API tokens

Remediation:

Revoke the Replicate API token in Account Settings > API Tokens. Tokens can be used to run paid model predictions. Create a replacement and store in environment variables or a secrets manager.


Severity: 🟡 Medium | Category: Secret Detection | Confidence threshold: 65% | Platforms: All

Detects Mailchimp marketing API keys

Remediation:

Revoke the Mailchimp API key in Account > Extras > API Keys. Create a new key with read-only access where possible and store in environment variables.


Severity: 🟡 Medium | Category: Secret Detection | Confidence threshold: 70% | Platforms: All

Detects Sentry Data Source Names which expose project identifiers and can ingest events

Remediation:

Sentry DSNs are semi-public (client-side use is expected) but should not appear in server-side secret stores or allow event submission from untrusted sources. Enable rate limiting and trusted domain filtering in Sentry project settings. For server-side Sentry auth tokens, treat as high severity.


Severity: 🟡 Medium | Category: Secret Detection | Confidence threshold: 65% | Platforms: All

Detects Codecov coverage upload tokens

Remediation:

Regenerate the Codecov token in repository settings. Codecov tokens can be used to upload falsified coverage reports; always store them as CI secrets.


Severity: 🟡 Medium | Category: Secret Detection | Confidence threshold: 70% | Platforms: All

Detects Discord webhook URLs which allow posting messages to channels

Remediation:

Delete the webhook in Discord channel settings and recreate it. Discord webhooks can be used to spam channels or phish users. Never hardcode webhook URLs in client-side code or public repositories.


Severity: 🟡 Medium | Category: Secret Detection | Confidence threshold: 65% | Platforms: All

Detects Segment analytics write keys

Remediation:

While write keys are designed for client-side use, server-side write keys should be stored in environment variables. Rotate in the Segment workspace Settings > Sources if you suspect server-side keys were leaked.


Severity: 🟡 Medium | Category: Secret Detection | Confidence threshold: 65% | Platforms: All

Detects Mixpanel project tokens and API secrets

Remediation:

Mixpanel project tokens are semi-public for ingestion but API secrets must be kept server-side. Rotate the API secret in Project Settings if exposed. Restrict data export access via Mixpanel service accounts.


Severity: 🟡 Medium | Category: Secret Detection | Confidence threshold: 75% | Platforms: All

Detects high-entropy strings assigned to variables named key, token, or secret

Remediation:

Replace hardcoded credentials with environment variable references. Rotate any exposed keys/tokens. Use a secrets manager such as HashiCorp Vault, AWS Secrets Manager, or your cloud provider’s equivalent.


sec-042 — High-Entropy Hex String Assigned to Secret Variable

Section titled “sec-042 — High-Entropy Hex String Assigned to Secret Variable”

Severity: 🟡 Medium | Category: Secret Detection | Confidence threshold: 75% | Platforms: All

Detects 32+ character hex strings assigned to secret-sounding variable names

Remediation:

Even if these appear to be test values, they may be real secrets committed by mistake. Rotate any values that may have been used in production and move them to environment variables or a secrets manager.


Severity: 🟡 Medium | Category: Secret Detection | Confidence threshold: 65% | Platforms: All

Detects PagerDuty service integration and API keys

Remediation:

Revoke the PagerDuty key in Integrations > API Access Keys. Leaked integration keys can trigger or silence incidents. Generate minimal-permission API keys and store them in a secrets manager.


Severity: 🟡 Medium | Category: Secret Detection | Confidence threshold: 65% | Platforms: All

Detects Zendesk support platform API tokens

Remediation:

Revoke the Zendesk API token in Settings > Apps and Integrations > Zendesk API. Zendesk tokens can access ticket data and customer PII. Rotate and store securely in a secrets manager.


Severity: 🟡 Medium | Category: Secret Detection | Confidence threshold: 65% | Platforms: All

Detects Atlassian (Jira/Confluence) API tokens

Remediation:

Revoke the Atlassian API token in Account Settings > Security > API tokens. These tokens authenticate as your user account. Generate tokens with the minimum required permissions and store them in a secrets manager.


Severity: 🟡 Medium | Category: Secret Detection | Confidence threshold: 65% | Platforms: All

Detects Airtable personal access tokens and legacy API keys

Remediation:

Revoke the Airtable personal access token in Account > Developer hub > PATs. Create replacement tokens scoped to specific bases and operations. Airtable keys can read and modify all base data in scope.


Severity: 🟡 Medium | Category: Secret Detection | Confidence threshold: 65% | Platforms: All

Detects Linear project management API keys

Remediation:

Revoke the Linear API key in Settings > API > Personal API Keys. Create a replacement key and store it in a secrets manager or CI/CD secrets.


Severity: 🟡 Medium | Category: Secret Detection | Confidence threshold: 65% | Platforms: All

Detects Notion internal integration tokens

Remediation:

Revoke the Notion integration token in Settings & Members > Integrations. Create a replacement token and limit its access to only the required pages and databases.


Severity: 🟡 Medium | Category: Secret Detection | Confidence threshold: 65% | Platforms: All

Detects Pusher real-time API application secrets

Remediation:

Rotate the Pusher app secret in the Pusher dashboard under App Keys. The app secret is used to sign webhook payloads and authenticate server-side publishing. Store in environment variables only.


Severity: 🟡 Medium | Category: Secret Detection | Confidence threshold: 65% | Platforms: All

Detects Amplitude analytics API keys and secret keys

Remediation:

Rotate keys in Amplitude under Settings > Projects. The secret key is required for server-side event ingestion and export APIs. Store in a secrets manager and use the API key for client-side tracking only.


Severity: 🟡 Medium | Category: Secret Detection | Confidence threshold: 65% | Platforms: All

Detects Mapbox public and secret access tokens

Remediation:

Rotate the Mapbox token in Account > Access Tokens. Secret tokens should never appear in client-side code. Public tokens should be URL-restricted in Mapbox account settings to prevent unauthorized tile requests.


Severity: 🟡 Medium | Category: Secret Detection | Confidence threshold: 65% | Platforms: All

Detects Intercom customer messaging platform access tokens

Remediation:

Revoke the Intercom access token in Settings > Developers > Access tokens. Intercom tokens can read customer conversations and user data. Store in a secrets manager and scope to the minimum required permissions.


IDNameSeverityConfidencePlatforms
supply-001Known Malicious NPM Package🔴 Critical40%All
supply-005Known Malicious Python Package🔴 Critical40%All
supply-006Known Malicious NPM Package (Extended)🔴 Critical40%All
supply-007Known Malicious Python Package (Extended)🔴 Critical40%All
yara-004Package.json Hijacking🔴 Critical40%All
supply-002NPM Typosquatting Pattern🟠 High50%All
supply-004Dangerous Postinstall Script🟠 High50%All
supply-008Common Typosquatting Heuristics🟠 High50%All
supply-003Overly Permissive Version Range🟡 Medium50%All

supply-001 — Known Malicious NPM Package

Section titled “supply-001 — Known Malicious NPM Package”

Severity: 🔴 Critical | Category: Supply Chain | Confidence threshold: 40% | Platforms: All

Dependency on an npm package known to be malicious or compromised

Remediation:

This dependency has a known security incident. Check if you’re using a patched version or find an alternative package.


supply-005 — Known Malicious Python Package

Section titled “supply-005 — Known Malicious Python Package”

Severity: 🔴 Critical | Category: Supply Chain | Confidence threshold: 40% | Platforms: All

Dependency on a Python package known to be malicious

Remediation:

This Python package is known to be malicious. Remove it immediately and audit your system.


supply-006 — Known Malicious NPM Package (Extended)

Section titled “supply-006 — Known Malicious NPM Package (Extended)”

Severity: 🔴 Critical | Category: Supply Chain | Confidence threshold: 40% | Platforms: All

Dependency on an npm package known to be malicious or compromised (extended list)

Remediation:

This package is known to be malicious or compromised. Remove it immediately and use the legitimate version.


supply-007 — Known Malicious Python Package (Extended)

Section titled “supply-007 — Known Malicious Python Package (Extended)”

Severity: 🔴 Critical | Category: Supply Chain | Confidence threshold: 40% | Platforms: All

Dependency on a Python package known to be malicious (extended list)

Remediation:

This Python package is known to be malicious. Remove it immediately and audit your system.


Severity: 🔴 Critical | Category: Supply Chain | Confidence threshold: 40% | Platforms: All

Detects preinstall/postinstall scripts with encoded or obfuscated payloads

Remediation:

No remediation guidance available.


Severity: 🟠 High | Category: Supply Chain | Confidence threshold: 50% | Platforms: All

Dependency name appears to be a typosquat of a popular package

Remediation:

Verify the package name is correct. Typosquatting is a common supply chain attack vector.


supply-004 — Dangerous Postinstall Script

Section titled “supply-004 — Dangerous Postinstall Script”

Severity: 🟠 High | Category: Supply Chain | Confidence threshold: 50% | Platforms: All

Package runs scripts during installation that download or execute external code

Remediation:

Inspect install scripts before running. Use —ignore-scripts flag with npm install for untrusted packages.


supply-008 — Common Typosquatting Heuristics

Section titled “supply-008 — Common Typosquatting Heuristics”

Severity: 🟠 High | Category: Supply Chain | Confidence threshold: 50% | Platforms: All

Detects common typosquatting patterns of popular packages

Remediation:

Verify the package name is correct. This appears to be a typosquat of a popular package.


supply-003 — Overly Permissive Version Range

Section titled “supply-003 — Overly Permissive Version Range”

Severity: 🟡 Medium | Category: Supply Chain | Confidence threshold: 50% | Platforms: All

Dependencies use wildcard or overly permissive version ranges

Remediation:

Use exact versions or semver ranges with upper bounds (e.g., ^1.2.3 or ~1.2.3). Never use * or latest in production.


IDNameSeverityConfidencePlatforms
sus-007Keylogging Patterns🔴 Critical85%All
sus-009Data Wiping Patterns🔴 Critical85%All
sus-010Reverse Shell Patterns🔴 Critical90%All
sus-003Anti-Debugging Techniques🟠 High80%All
sus-005Persistence Mechanisms🟠 High80%All
sus-006Cryptocurrency Mining Indicators🟠 High80%All
sus-008Camera/Microphone Access🟠 High80%All
sus-013Self-Modification🟠 High80%All
sus-016Python Dangerous Execution🟠 High60%All
sus-001Obfuscated Code Detection🟡 Medium70%All
sus-002Dynamic Code Execution🟡 Medium65%All
sus-004Network Reconnaissance🟡 Medium75%All
sus-011Timestomping🟡 Medium75%All
sus-012Unusual File Locations🟡 Medium70%All
sus-014Abnormal Process Spawning🟡 Medium70%All
sus-015Encoding Without Clear Purpose🟢 Low60%All

Severity: 🔴 Critical | Category: Suspicious Behavior | Confidence threshold: 85% | Platforms: All

Detects keylogging or input capture patterns

Remediation:

Keylogging is highly malicious. This should never be present in an AI agent.


Severity: 🔴 Critical | Category: Suspicious Behavior | Confidence threshold: 85% | Platforms: All

Detects patterns that could wipe data

Remediation:

Data wiping commands are extremely dangerous. These should never be in an AI agent.


Severity: 🔴 Critical | Category: Suspicious Behavior | Confidence threshold: 90% | Platforms: All

Detects reverse shell creation patterns

Remediation:

Reverse shells are highly malicious. This is a critical security threat.


Severity: 🟠 High | Category: Suspicious Behavior | Confidence threshold: 80% | Platforms: All

Detects attempts to detect or evade debugging

Remediation:

Anti-debugging techniques indicate the code may be trying to hide malicious behavior.


Severity: 🟠 High | Category: Suspicious Behavior | Confidence threshold: 80% | Platforms: All

Detects attempts to establish persistence

Remediation:

Persistence mechanisms should not be created by AI agents. Remove these patterns.


sus-006 — Cryptocurrency Mining Indicators

Section titled “sus-006 — Cryptocurrency Mining Indicators”

Severity: 🟠 High | Category: Suspicious Behavior | Confidence threshold: 80% | Platforms: All

Detects potential cryptocurrency mining code

Remediation:

Cryptocurrency mining should never be present in AI agent code.


Severity: 🟠 High | Category: Suspicious Behavior | Confidence threshold: 80% | Platforms: All

Detects attempts to access camera or microphone

Remediation:

Camera and microphone access requires explicit user consent. Review this carefully.


Severity: 🟠 High | Category: Suspicious Behavior | Confidence threshold: 80% | Platforms: All

Detects code that modifies itself

Remediation:

Self-modifying code is suspicious and may be used to hide malicious payloads.


Severity: 🟠 High | Category: Suspicious Behavior | Confidence threshold: 60% | Platforms: All

Detects dangerous Python execution functions that can run arbitrary code

Remediation:

Avoid these functions in AI agent code. Use safe alternatives like ast.literal_eval() and yaml.safe_load().


Severity: 🟡 Medium | Category: Suspicious Behavior | Confidence threshold: 70% | Platforms: All

Detects heavily obfuscated or encoded code

Remediation:

Heavily obfuscated code is suspicious. Deobfuscate and review the actual behavior.


Severity: 🟡 Medium | Category: Suspicious Behavior | Confidence threshold: 65% | Platforms: All

Detects dynamic code execution patterns

Remediation:

Dynamic code execution can hide malicious behavior. Review the executed code carefully.


Severity: 🟡 Medium | Category: Suspicious Behavior | Confidence threshold: 75% | Platforms: All

Detects network scanning or reconnaissance patterns

Remediation:

Network reconnaissance should not be performed by AI agents without explicit permission.


Severity: 🟡 Medium | Category: Suspicious Behavior | Confidence threshold: 75% | Platforms: All

Detects file timestamp manipulation

Remediation:

Timestamp manipulation is often used to hide malicious activity. Review carefully.


Severity: 🟡 Medium | Category: Suspicious Behavior | Confidence threshold: 70% | Platforms: All

Detects operations in unusual file locations

Remediation:

Hidden files in unusual locations may indicate attempts to hide malicious activity.


Severity: 🟡 Medium | Category: Suspicious Behavior | Confidence threshold: 70% | Platforms: All

Detects suspicious process creation patterns

Remediation:

Detached background processes may indicate persistence attempts. Review carefully.


sus-015 — Encoding Without Clear Purpose

Section titled “sus-015 — Encoding Without Clear Purpose”

Severity: 🟢 Low | Category: Suspicious Behavior | Confidence threshold: 60% | Platforms: All

Detects unnecessary encoding or weak encryption

Remediation:

Unnecessary encoding or weak encryption may be used to obfuscate malicious code.


IDNameSeverityConfidencePlatforms
tp-001Hidden Instructions in Tool Descriptions🔴 Critical50%All
tp-004MCP Server Config Injection🔴 Critical50%All
tp-006Homoglyph Characters in Tool Names🔴 Critical50%All
tp-002Prompt Override in Tool Description🟠 High55%All
tp-003Tool Shadowing via Known Trusted Names🟠 High55%All
tp-007Base64-Encoded Payload in Tool Description🟠 High55%All
tp-008Tool Name Shadows Common System Commands🟠 High60%mcp, claude, codex, cursor
tp-009Hidden Markdown or HTML Directives in Tool Descriptions🟠 High55%All
tp-005Suspicious Sensitive Parameters in Tool Definitions🟡 Medium60%All
tp-010Tool Description Length Anomaly🟡 Medium50%All

tp-001 — Hidden Instructions in Tool Descriptions

Section titled “tp-001 — Hidden Instructions in Tool Descriptions”

Severity: 🔴 Critical | Category: Tool Poisoning | Confidence threshold: 50% | Platforms: All

Detects invisible Unicode characters and HTML comments used to hide malicious instructions inside tool or function descriptions

Remediation:

Remove all invisible Unicode characters and HTML comments from tool descriptions. These are used by attackers to smuggle hidden instructions that are processed by AI agents but invisible to human reviewers. Audit any tool description that was fetched from an external or untrusted source.


Severity: 🔴 Critical | Category: Tool Poisoning | Confidence threshold: 50% | Platforms: All

Detects code that writes to MCP configuration files or dynamically adds server entries, which can silently register malicious tools

Remediation:

Code must not write to MCP configuration files at runtime. MCP server registration is an administrative action that should only happen through official, user-approved configuration channels. Dynamic modification of MCP configs is a primary attack vector for silently registering malicious tool servers. Remove any code that constructs or writes mcpServers entries programmatically.


tp-006 — Homoglyph Characters in Tool Names

Section titled “tp-006 — Homoglyph Characters in Tool Names”

Severity: 🔴 Critical | Category: Tool Poisoning | Confidence threshold: 50% | Platforms: All

Detects visually deceptive Unicode characters in tool names that impersonate legitimate tools while routing to malicious implementations

Remediation:

Tool names containing non-ASCII homoglyphs are a visual deception attack. An attacker registers a tool whose name looks identical to a trusted tool but uses different Unicode codepoints. Validate that all tool names contain only standard ASCII characters (U+0020-U+007E). Reject any tool with non-ASCII identifiers.

References:


tp-002 — Prompt Override in Tool Description

Section titled “tp-002 — Prompt Override in Tool Description”

Severity: 🟠 High | Category: Tool Poisoning | Confidence threshold: 55% | Platforms: All

Detects prompt injection language embedded in tool descriptions or metadata that attempts to override AI instructions

Remediation:

Remove all prompt injection language from tool descriptions and metadata. Tool descriptions should only describe the tool’s legitimate purpose and parameters. Any text attempting to override AI instructions is a tool poisoning attack. Validate all tool descriptions fetched from external MCP servers before use.


tp-003 — Tool Shadowing via Known Trusted Names

Section titled “tp-003 — Tool Shadowing via Known Trusted Names”

Severity: 🟠 High | Category: Tool Poisoning | Confidence threshold: 55% | Platforms: All

Detects tool registrations that use the names of well-known trusted tools to hijack AI behavior

Remediation:

A tool is being registered under a name that matches a well-known trusted tool. This is a classic tool shadowing attack: a malicious MCP server registers a tool with an identical name to intercept calls intended for the legitimate tool. Audit the source of this tool registration and verify the server’s identity before use.


tp-007 — Base64-Encoded Payload in Tool Description

Section titled “tp-007 — Base64-Encoded Payload in Tool Description”

Severity: 🟠 High | Category: Tool Poisoning | Confidence threshold: 55% | Platforms: All

Detects base64-encoded content embedded in tool descriptions, which may hide malicious instructions from human reviewers

Remediation:

Tool descriptions must contain only human-readable text describing the tool’s legitimate purpose. Base64-encoded content in descriptions is used to smuggle hidden instructions that are decoded and executed by the AI agent. Remove all encoded payloads and fetch tool descriptions only from trusted sources.

References:


tp-008 — Tool Name Shadows Common System Commands

Section titled “tp-008 — Tool Name Shadows Common System Commands”

Severity: 🟠 High | Category: Tool Poisoning | Confidence threshold: 60% | Platforms: mcp, claude, codex, cursor

Detects tool registrations using names of common system commands (ls, cat, curl, wget, bash) to intercept agent shell operations

Remediation:

A tool with the same name as a system command is a tool shadowing attack. The malicious tool intercepts calls intended for the legitimate system command. Tool names must be unique, namespaced (e.g., vendor-toolname), and must not collide with system command names or other registered tools.

References:


tp-009 — Hidden Markdown or HTML Directives in Tool Descriptions

Section titled “tp-009 — Hidden Markdown or HTML Directives in Tool Descriptions”

Severity: 🟠 High | Category: Tool Poisoning | Confidence threshold: 55% | Platforms: All

Detects markdown links, HTML tags, and formatting directives embedded in tool descriptions used to inject hidden instructions

Remediation:

Tool descriptions must be plain text only. HTML, Markdown with active links, and CSS styles embedded in descriptions are used to hide instructions from human reviewers while remaining visible to AI agents parsing the raw text. Strip all HTML/Markdown formatting from tool descriptions before display.

References:


tp-005 — Suspicious Sensitive Parameters in Tool Definitions

Section titled “tp-005 — Suspicious Sensitive Parameters in Tool Definitions”

Severity: 🟡 Medium | Category: Tool Poisoning | Confidence threshold: 60% | Platforms: All

Detects tool parameter definitions that request sensitive credentials, keys, or secrets from the user

Remediation:

Tool parameter definitions must not request passwords, tokens, API keys, or private keys. Legitimate tools access credentials through secure environment variables or secrets managers, never by asking the user (or the AI agent) to supply them as tool arguments. A tool that requires credentials as parameters is likely a credential-harvesting attack.


tp-010 — Tool Description Length Anomaly

Section titled “tp-010 — Tool Description Length Anomaly”

Severity: 🟡 Medium | Category: Tool Poisoning | Confidence threshold: 50% | Platforms: All

Detects abnormally long tool descriptions (>5000 characters) which strongly suggest hidden content or embedded instructions

Remediation:

Legitimate tool descriptions are concise (typically under 500 characters). Descriptions over 5000 characters almost always indicate hidden content: invisible text, encoded payloads, or injected instructions. Cap tool description length at 1000 characters and reject over-length descriptions.

References: