Threat intelligence for the AI coding tool ecosystem. 3,984 skills scanned. Here's what we found.
Hidden instructions in SKILL.md that instruct the agent to run malicious commands.
Injection of persistent instructions into SOUL.md, MEMORY.md, CLAUDE.md, AGENTS.md.
Benign config approved once, then mutated to malicious version that auto-executes.
Attacker manipulates MCP session/output; client trusts poisoned response.
Malicious website rebinds domain to 127.0.0.1 to access local MCP servers.
Malicious packages published to registries mimicking legitimate MCP servers.
Malicious .claude/hooks/ scripts run on agent events with full user privileges.
Agent instructed to read credential files and send to attacker.
| CVE ID ▲ | Component ▲ | Severity ▲ | Fixed In ▲ |
|---|---|---|---|
| CVE-2025-53109 | Filesystem MCP Server | High | 0.6.3 |
| CVE-2025-53110 | Filesystem MCP Server | High | 0.6.3 |
| CVE-2025-49596 | MCP Inspector | Critical | 0.14.1 |
| CVE-2025-68143 | MCP Git Server | High | 2025.9.25 |
| CVE-2025-68144 | MCP Git Server | High | 2025.12.18 |
| CVE-2025-68145 | MCP Git Server | High | 2025.12.18 |
| CVE-2025-66416 | MCP Python SDK | Medium | 1.23.0 |
| CVE-2025-64443 | MCP Gateway | Medium | 0.28.0 |
| CVE-2026-25536 | MCP TypeScript SDK | High | 1.26.0 |
| CVE-2025-54135 | Cursor IDE | High | 1.3.9 |
| CVE-2025-54136 | Cursor IDE | High | 1.3.9 |
| CVE-2025-66032 | Claude Code | High | 1.0.93 |
| CVE-2026-24052 | Claude Code WebFetch | High | 1.0.111 |
| ADVISORY-CC-2026-001 | Claude Code (Sandbox Bypass) | High | 2.1.34 |
| CVE-2025-53967 | Figma MCP Server | High | 0.6.3 |
| CVE-2025-9611 | Playwright MCP | Medium | 0.0.40 |
| CVE-2025-6515 | MCP SSE Transport | High | -- |
| CVE-2026-25546 | Godot MCP Server | High | 0.1.1 |
| CVE-2025-54073 | mcp-package-docs | High | 0.1.28 |
Largest known malicious AI agent skill campaign. 335 skills deploy Atomic Stealer (AMOS) macOS malware via fake prerequisites in SKILL.md. 6 outlier skills use alternate payloads (reverse shells, credential theft).
Comprehensive audit of ClawHub and skills.sh ecosystems. Found 36.82% of all scanned skills have security flaws. 13.4% are critical-risk. 76 contain confirmed malicious payloads.
Three malicious Python packages on PyPI masquerading as MCP server implementations. Each spawns a reverse shell to 45.115.38.27:4433 before starting the legitimate MCP server functionality.
mcp-runcmd-servermcp-runcommand-servermcp-runcommand-server2/bin/sh -i reverse shell before starting MCP serverA malicious npm package named postmark-mcp that copies the official Postmark MCP server with a hidden backdoor injected into the codebase.
npx mcp-scan to detect known squattersScans MCP server configurations for vulnerabilities. Detects known vulnerable servers and versions.
github.com/invariantlabs-ai/mcp-scanValidates skill spec compliance (SKILL.md structure, frontmatter, naming conventions).
docs.rs/skills-ref-rs37+ probe modules for LLM vulnerabilities. Prompt injection detection and jailbreak testing.
github.com/NVIDIA/garakScans npm/PyPI dependencies of MCP servers. Queries CVE databases for risk scores.
github.com/mcp-fortress/mcp-fortressSoftware composition analysis integrated with agents. Detects slopsquatting and malicious packages.
safedep.io/introducing-vet-mcp-serverClawHub security addon. Checks skills against Koi malicious skill database pre-install and retroactively.
koi.ai/blog/clawhavocThis guide includes two slash commands for security auditing your configuration: /security-check for a quick 30-second scan, and /security-audit for a full 6-phase audit with a score out of 100. See the next section for details.