Security Risks and Mitigations for AI Agent Skills
Covering OpenClaw (SKILL.md YAML), Claude Code (skill.json), Cursor/Codex (manifest.json), and VS Code (package.json) ecosystems.
- 🌐 Website: https://owasp.github.io/www-project-agentic-skills-top-10/
- 📖 Documentation: Full Documentation
- 🐙 GitHub Repository: https://github.com/OWASP/www-project-agentic-skills-top-10
- 🏛️ OWASP Project Page: https://owasp.org/www-project-agentic-skills-top-10
- 📋 Security Checklist: checklist.md
- 🔧 Universal Skill Format: universal-skill-format.md
- 📊 Case Studies: case-studies.md
- 🛡️ Threat Intelligence: threat-intelligence.md
- 🔍 Risk Assessment Tool: risk-assessment.md
- 🔎 Skill Scanner Integration: skill-scanner-integration.md
- 🔌 API Documentation: api-documentation.md
- 📚 Skill Development Guide: skill-development-guide.md
- ⚖️ Platform Comparison: platform-comparison.md
- 👥 Community & Contribution: community-contribution.md
- 🎓 Training & Certification: training-certification.md
- 🚨 Incident Response Playbook: incident-response.md
- 📊 Security Metrics & Monitoring: metrics-monitoring.md
- 🤝 Contributing: CONTRIBUTING.md
- 🛠️ Maintenance: MAINTENANCE.md
The OWASP Agentic Skills Top 10 (AST10) is the first comprehensive security framework for AI agent skills. It documents the 10 most critical security risks in agentic AI skills across all major AI agent platforms, providing evidence-based mitigations and prevention strategies.
- 🎯 Platform Coverage: OpenClaw, Claude Code, Cursor/Codex, VS Code
- 🔍 Risk Analysis: 10 critical security risks with real-world evidence
- 🛡️ Mitigation Strategies: Practical prevention and response guidance
- 📊 MAESTRO Mapping: Alignment with CSA's 7-layer threat model
- 🔗 Cross-References: Interconnected risk analysis
- 📝 Universal Format: Cross-platform skill security standard
- 👥 Community Driven: Open source with active contributor community
While significant attention has been given to securing LLMs and MCP tools, agent skills represent the behavior layer that translates AI capabilities into real-world actions. Skills define how agents orchestrate multi-step workflows, making them a critical attack surface.
2026 Statistics:
- 3,984 skills scanned across registries
- 36.82% contained security flaws
- 13.4% had critical vulnerabilities
- 76+ confirmed malicious payloads
- 1,184 skills in ClawHavoc campaign
This is not a theoretical future risk. The AI agent skill ecosystem is under active attack as of Q1 2026.
| Threat | Impact | Evidence |
|---|---|---|
| ClawHavoc Campaign | 1,184 malicious skills | Antiy CERT (Feb 2026) |
| Registry Poisoning | 36.82% skills vulnerable | Snyk ToxicSkills (Feb 2026) |
| Claude Code RCE | CVE-2025-59536/21852 | Check Point Research (Feb 2026) |
| WebSocket Hijacking | CVE-2026-28363 | Oasis Security (Feb 2026) |
| Supply Chain Attacks | 280+ leaky skills | Snyk (Feb 2026) |
An AI agent skill is especially dangerous when it has:
- Access to private data (SSH keys, API credentials, wallet files)
- Exposure to untrusted content (skill instructions, memory files, email)
- Ability to communicate externally (network egress, webhook calls)
Most production agent deployments satisfy all three conditions.
| # | Risk | Severity | Key Mitigation |
|---|---|---|---|
| AST01 | Malicious Skills | Critical | Cryptographic signing, behavioral scanning |
| AST02 | Supply Chain Compromise | Critical | Transparency logs, dependency pinning |
| AST03 | Over-Privileged Skills | High | Least-privilege manifests, runtime enforcement |
| AST04 | Insecure Metadata | High | Schema validation, provenance tracking |
| AST05 | Unsafe Deserialization | High | Safe parsers, sandboxed loading |
| AST06 | Weak Isolation | High | Containerization, process isolation |
| AST07 | Update Drift | Medium | Immutable pinning, hash verification |
| AST08 | Poor Scanning | Medium | Multi-tool pipeline, semantic analysis |
| AST09 | No Governance | Medium | Skill inventories, audit logging |
| AST10 | Cross-Platform Reuse | Medium | Universal format, platform validation |
See index.md for detailed descriptions and MAESTRO mappings.
- Assess Current Posture: Use the Security Assessment Checklist
- Review Risk Details: Read the 10 AST files for specific platform guidance
- Implement Controls: Apply mitigations appropriate to your environment
- Monitor Threats: Subscribe to security advisories and threat intelligence
- Follow Best Practices: Implement least-privilege and secure coding
- Use Universal Format: Adopt the proposed cross-platform standard
- Sign Your Skills: Enable cryptographic verification
- Test Security: Validate in isolated environments
- Registry Security: Implement scanning and provenance tracking
- Runtime Isolation: Default to sandboxed execution
- Audit Logging: Enable comprehensive activity monitoring
- User Trust: Require explicit confirmation for privileged operations
We welcome contributions from the community! Here's how to get involved:
- 🐛 Report Issues: Found a security risk or documentation error?
- ✨ Add Content: New examples, mitigations, or research
- 🔧 Code Examples: Provide secure coding patterns
- 🌐 Translations: Help localize the guide
- 📊 Research: Share threat intelligence or analysis
- Read Guidelines: Check CONTRIBUTING.md
- Fork & Clone: Work on your own branch
- Use Templates: Issue and PR templates provided
- Test Changes: Run validation scripts
- Submit PR: Follow the contribution workflow
Use our interactive web form to submit new AST risk entries:
The form generates properly formatted markdown and provides multiple submission options:
- Direct GitHub file creation
- Create GitHub Issue
- Download and manual PR
- ** Mailing List**: owasp-agentic-skills@lists.owasp.org
Status: Active Development → Launch Preparation
Version: 1.0 (2026 Edition)
License: CC BY-SA 4.0
| Phase | Status | Deliverables |
|---|---|---|
| Foundation | ✅ Complete | Repo, OWASP page, AST01-10 drafts |
| Content Expansion | ✅ Complete | Examples, code samples, references |
| UX & Community | ✅ Complete | Templates, checklists, interactive elements |
| Maintenance Setup | ✅ Complete | Automation, governance, procedures |
| Launch Preparation | 🔄 In Progress | Final polish, validation, promotion |
- 📈 Adoption: 2+ major registries implement Universal Format
- 🌍 Community: 50+ contributors, active discussions
- 🎯 Impact: Referenced in OWASP Top 10, industry standards
- 📊 Quality: 100% link validity, comprehensive coverage
- Full Website: Complete documentation
- Risk Details: All 10 risks in one document
- Security Checklist: Assessment and remediation guide
- Universal Format: Cross-platform standard specification
- Snyk ToxicSkills (Feb 2026): Comprehensive skill ecosystem audit
- Check Point Research: Claude Code vulnerability analysis
- Antiy CERT: ClawHavoc campaign analysis
- CSA MAESTRO: 7-layer threat model for agentic AI
- Validation Script: Content quality checker
- Maintenance Guide: Long-term project procedures
- GitHub Actions: Automated testing and deployment
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
You are free to share and adapt this material for any purpose, provided you give appropriate credit, provide a link to the license, indicate if changes were made, and distribute your contributions under the same license.
Project Lead: Ken Huang — OWASP AIVSS Lead, Agentic AI Security Researcher
- 📧 Email: ken.huang@owasp.org
- 🐙 GitHub: @kenhuang
- 🔗 LinkedIn: Ken Huang
For questions, suggestions, or to get involved:
- Open an issue on GitHub
OWASP Agentic Skills Top 10 - Protecting the AI Agent Ecosystem 🛡️🤖
- Relationship to Existing OWASP Projects
- Getting Started
- Target Audience
- Project Status and Timeline
- Key Deliverables
- Scope
- Leadership and Governance
- Key Research and References
- License
The OWASP Agentic Skills Top 10 (AST10) documents the 10 most critical security risks in agentic AI skills across all major AI agent platforms. Skills represent the execution layer that gives agents real-world impact: they define not just what resources agents can access, but how they orchestrate multi-step workflows autonomously.
While significant attention has been devoted to securing large language models (LLMs) and the Model Context Protocol (MCP) tool layer, the intermediate behavior layer—embodied in agentic skills—has emerged as a particularly vulnerable and under-protected component of the AI agent ecosystem. This project exists to close that gap.
Mental Model: MCP = how the model talks to tools; AST10 = what those tools actually do.
MAESTRO Mapping: Each AST10 risk is mapped to the Cloud Security Alliance's MAESTRO 7-layer threat model for agentic AI systems, enabling targeted threat localization and cross-layer risk analysis.
This is not a theoretical future risk. The AI agent skill ecosystem is under active attack as of Q1 2026.
By the numbers:
| Metric | Figure | Source |
|---|---|---|
| Skills scanned | 3,984 | Snyk ToxicSkills (Feb 2026) |
| Skills with security flaws | 1,467 (36.82%) | Snyk ToxicSkills (Feb 2026) |
| Skills with critical issues | 534 (13.4%) | Snyk ToxicSkills (Feb 2026) |
| Confirmed malicious payloads | 76+ | Snyk ToxicSkills (Feb 2026) |
| ClawHavoc campaign: malicious skills | 1,184 | Antiy CERT (Feb 2026) |
| OpenClaw instances internet-exposed | 135,000+ | SecurityScorecard (Feb 2026) |
| CVEs disclosed (OpenClaw alone) | 9 (3 with public exploits) | Endor Labs (Feb 2026) |
| Skills analyzed across all registries | 30,000+ | National CIO Review / Cisco (2026) |
| Skills containing at least one vulnerability | >25% | National CIO Review (2026) |
The ClawHub registry—the primary marketplace for OpenClaw skills—became the first AI agent registry to be systematically poisoned at scale. Five of the top seven most-downloaded skills at peak infection were confirmed malware. The registry has since implemented automated scanning and partnered with VirusTotal, but the broader ecosystem remains largely unprotected.
Check Point Research disclosed two critical vulnerabilities in Claude Code (CVE-2025-59536, CVSS 8.7; CVE-2026-21852, CVSS 5.3) demonstrating that repository-level configuration files now function as part of the execution layer—simply cloning and opening an untrusted project can trigger remote code execution and API key exfiltration before any user consent dialog appears.
No comprehensive security framework or dedicated guidance for agent skills existed before this project. That gap is what AST10 addresses.
Agentic AI skills are reusable, named behaviors that encode complete workflows, including:
- Task understanding and goal decomposition
- Multi-step planning and tool orchestration
- File system, network, and shell access
- Safety guardrails and output formatting
- Persistent memory and cross-session state
Unlike MCP tools (which define what resources and actions are available), skills define how to use those tools in sequence to accomplish user goals. This behavioral abstraction layer creates unique security challenges that cannot be addressed by securing either the model or the protocol layer alone.
The "Lethal Trifecta" (Simon Willison / Palo Alto Networks, 2026): An AI agent skill is especially dangerous when it simultaneously has:
- Access to private data (SSH keys, API credentials, wallet files, browser data)
- Exposure to untrusted content (skill instructions, memory files, email)
- Ability to communicate externally (network egress, webhook calls, curl)
Most production agent deployments today satisfy all three conditions.
| Platform | Skill Format | Primary Risk File |
|---|---|---|
| OpenClaw | SKILL.md (YAML frontmatter + Markdown) |
SKILL.md, SOUL.md, MEMORY.md |
| Claude Code | skill.json / YAML + scripts/ |
.claude/settings.json, hooks config |
| Cursor / Codex | manifest.json + handler scripts |
manifest.json, tool configs |
| VS Code | package.json + extensions |
package.json, extension.ts |
The following is a condensed timeline of confirmed real-world incidents involving AI agent skill security, drawn from publicly disclosed research and CVE records.
-
Jan 27–29: ClawHavoc campaign launches. Attackers register as ClawHub developers and flood the registry with 341 malicious skills in a 3-day window. All 335 AMOS-delivering skills share a single C2 IP (
91.92.242[.]30). Target data includes exchange API keys, wallet private keys, SSH credentials, browser passwords, and.envfiles. Skills also write malicious instructions directly intoMEMORY.mdandSOUL.mdfor session-persistent backdooring. -
Jan 31: ClawHavoc surge peaks. Koi Security names the campaign and begins coordinated removal effort. Some packages persist for weeks.
-
Feb 1: Koi Security publishes first public ClawHavoc analysis.
-
Feb 3: Snyk publishes "From SKILL.md to Shell Access in Three Lines of Markdown" threat model, documenting how three lines of markdown in a
SKILL.mdfile can instruct an agent to read SSH keys and exfiltrate them. -
Feb 4: Alice publishes findings on several published OpenClaw skills found to be actively malicious while in use by over 6,000 users — detected via behavioral analysis (Yahoo Finance).
-
Feb 5: Snyk publishes ToxicSkills — the first comprehensive security audit of the AI agent skill ecosystem. Key findings: 36% of skills contain security flaws; 13.4% contain critical-level issues; 76 confirmed active malicious payloads; 8 malicious skills still live at time of publication.
-
Feb 5: Snyk publishes "280+ Leaky Skills: How OpenClaw & ClawHub Are Exposing API Keys and PII" — a parallel finding showing credential exposure at scale through over-permissioned skills.
-
Feb 10: Snyk documents "How a Malicious Google Skill on ClawHub Tricks Users Into Installing Malware" — typosquatting and fake brand impersonation confirmed as active tactics.
-
Feb 11: Snyk publishes "Why Your Skill Scanner Is Just False Security (and Maybe Malware)" — demonstrating that pattern-matching scanners miss the majority of critical threats, which rely on natural-language instruction manipulation rather than code signatures.
-
Feb 14: OpenClaw patches log poisoning vulnerability (version 2026.2.13). Attackers could write malicious content to agent log files via WebSocket requests; since the agent reads its own logs for troubleshooting, injected text could influence decisions and trigger indirect prompt injection.
-
Feb 25: Check Point Research publicly discloses CVE-2025-59536 (CVSS 8.7) and CVE-2026-21852 (CVSS 5.3) in Claude Code. Both were patched months earlier but the disclosure confirms: repository-controlled configuration files can silently execute arbitrary shell commands and exfiltrate API keys at project open time, before any trust dialog.
-
Feb 26: ClawJacked disclosed by Oasis Security (CVE-2026-28363, CVSS 9.9). Malicious websites can brute-force localhost WebSocket connections with no rate limiting to silently hijack local OpenClaw instances, register new devices without user prompts, and exfiltrate data through existing agent integrations. OpenClaw patches within 24 hours (version 2026.2.25).
-
Feb 2026: Antiy CERT publishes ClawHavoc Campaign Analysis, classifying malware as
Trojan/OpenClaw.PolySkill. Final tally: 1,184 malicious skills across 12 publisher accounts. Hudson Rock separately identifies Vidar infostealer variants specifically targeting OpenClaw agent identity files (openclaw.json,device.json,soul.md,memory.md). -
Feb 2026: Microsoft Defender Security Research Team issues advisory: "Because of these characteristics, OpenClaw should be treated as untrusted code execution with persistent credentials. It is not appropriate to run on a standard personal or enterprise workstation."
-
Feb 2026: BlueRock Security analyzes 7,000+ MCP servers; finds 36.7% potentially vulnerable to SSRF. Proof-of-concept against Microsoft's MarkItDown MCP server retrieves AWS IAM keys from EC2 metadata endpoint.
-
Mar 2026: SecurityScorecard confirms 135,000+ OpenClaw instances publicly internet-exposed with insecure defaults; 53,000+ correlated with prior breach activity. Bitdefender telemetry confirms employees deploying OpenClaw on corporate devices with no SOC visibility.
-
Mar 2026: Snyk and Tessl announce registry-level skill security scanning partnership. Snyk and Vercel previously partnered to scan skills on
skills.shat install time. -
NIST / CAISI: Federal Register RFI on AI Agent Security (published Jan 8, 2026, comments closed Mar 9, 2026) — the first formal US government solicitation specifically addressing AI agent security risks.
| # | Risk | Severity | Platforms Affected | Key Mitigation | Real-World Evidence |
|---|---|---|---|---|---|
| AST01 | Malicious Skills | Critical | All | Merkle root signing, registry scanning | ClawHavoc (1,184 skills), ToxicSkills (76 payloads) |
| AST02 | Supply Chain Compromise | Critical | All | Registry transparency, provenance tracking | ClawHub collapse, Claude Code CVE-2025-59536 |
| AST03 | Over-Privileged Skills | High | All | Least-privilege manifests, schema validation | 280+ credential-leaking skills (Snyk, Feb 2026) |
| AST04 | Insecure Metadata | High | All | Static analysis, manifest linting | Fake "Google" skill impersonation (ClawHub) |
| AST05 | Unsafe Deserialization | High | All | Safe parsers, sandboxed loading | YAML-based payload delivery in SKILL.md |
| AST06 | Weak Isolation | High | All | Containerization, Docker sandboxing | OpenClaw host-mode execution, 135K exposed instances |
| AST07 | Update Drift | Medium | All | Immutable pinning, hash verification | ClawJacked (CVE-2026-28363), patch-lag exploitation |
| AST08 | Poor Scanning | Medium | All | Semantic + behavioral multi-tool pipeline | Pattern-matcher bypass via natural-language injection |
| AST09 | No Governance | Medium | All | Skill inventories, agentic identity controls | 53K exposed instances with no SOC visibility |
| AST10 | Cross-Platform Reuse | Medium | All | Universal YAML format | Malicious skills ported across ClawHub, skills.sh |
Each of the 10 risks is documented in a separate file. Click on the risk name to view the full details.
| # | Risk | Severity | Platforms Affected | Key Mitigation | Real-World Evidence |
|---|---|---|---|---|---|
| AST01 | Malicious Skills | Critical | All | Merkle root signing, registry scanning | ClawHavoc (1,184 skills), ToxicSkills (76 payloads) |
| AST02 | Supply Chain Compromise | Critical | All | Registry transparency, provenance tracking | ClawHub collapse, Claude Code CVE-2025-59536 |
| AST03 | Over-Privileged Skills | High | All | Least-privilege manifests, schema validation | 280+ credential-leaking skills (Snyk, Feb 2026) |
| AST04 | Insecure Metadata | High | All | Static analysis, manifest linting | Fake "Google" skill impersonation (ClawHub) |
| AST05 | Unsafe Deserialization | High | All | Safe parsers, sandboxed loading | YAML-based payload delivery in SKILL.md |
| AST06 | Weak Isolation | High | All | Containerization, Docker sandboxing | OpenClaw host-mode execution, 135K exposed instances |
| AST07 | Update Drift | Medium | All | Immutable pinning, hash verification | ClawJacked (CVE-2026-28363), patch-lag exploitation |
| AST08 | Poor Scanning | Medium | All | Semantic + behavioral multi-tool pipeline | Pattern-matcher bypass via natural-language injection |
| AST09 | No Governance | Medium | All | Skill inventories, agentic identity controls | 53K exposed instances with no SOC visibility |
| AST10 | Cross-Platform Reuse | Medium | All | Universal YAML format | Malicious skills ported across ClawHub, skills.sh |
For detailed descriptions, attack scenarios, preventive mitigations, and OWASP mappings, see each individual risk file.
The following YAML format is proposed as a cross-platform standard that mitigates AST10 and provides the metadata foundation required to address AST01 through AST09. It is designed to be a superset of all current platform-specific formats.
---
# Universal Agentic Skill Format v1.0
# Compatible with: OpenClaw, Claude Code, Cursor/Codex, VS Code
name: example-skill
version: 1.0.0
platforms: [openclaw, claude, cursor, vscode]
description: "Safe example skill — concise, honest statement of function"
author:
name: "Author Name"
identity: "did:web:example.com" # Decentralized identity anchor
signing_key: "ed25519:pubkey_hex_here"
permissions:
files:
read:
- ~/.config/app.json # Explicit paths only; no wildcards
write:
- ~/.config/app.json
deny_write:
- SOUL.md
- MEMORY.md
- AGENTS.md # Identity files require explicit grant
network:
allow:
- api.example.com # Domain allowlist, not binary on/off
deny: "*" # Default deny all other egress
shell: false # Explicit shell access declaration
tools:
- web_fetch
- read_file
requires:
binaries: [jq, curl]
min_runtime_version: "2026.1.0"
risk_tier: L1 # L0=safe, L1=low, L2=elevated, L3=destructive
scan_status:
scanner: "snyk-agent-scan@1.4.0"
last_scanned: "2026-02-15"
result: "pass"
signature: "ed25519:ABCDEF1234567890..." # Signs the canonical hash of this manifest
content_hash: "sha256:abcdef1234..." # Hash of the complete skill package
changelog:
- version: "1.0.0"
date: "2026-02-01"
notes: "Initial release"
---Format design rationale:
permissions.deny_writeprotects identity files (SOUL.md,MEMORY.md) by default — must be explicitly overridden.network.allowis a domain allowlist, not a boolean — closing the "network: true" over-permission gap (AST03).signatureandcontent_hashtogether enable Merkle-root registry verification (AST01/AST02).scan_statuscreates a machine-readable provenance trail (AST08/AST09).risk_tierenables automated governance policies without per-skill review (AST09/AST10).
AST10 fills the gap between protocol-layer and model-layer security — a gap that no existing project addresses.
┌─────────────────────────────────────────────────────────────┐
│ OWASP Security Stack │
├─────────────────────────────────────────────────────────────┤
│ LLM Top 10 / Agentic Top 10 ← Model & reasoning layer │
├─────────────────────────────────────────────────────────────┤
│ OWASP AST10 (this project) ← Skill content layer ◄── │
├─────────────────────────────────────────────────────────────┤
│ OWASP MCP Top 10 ← Protocol layer │
└─────────────────────────────────────────────────────────────┘
| OWASP Project | Relationship to AST10 |
|---|---|
| LLM Top 10 | AST10 extends LLM03 (Supply Chain) specifically to the skill layer; extends LLM09 (Excessive Agency) with skill-specific permission controls |
| Agentic AI Top 10 | AST10 specializes the "tools layer" risk beneath agent-level reasoning risks |
| MCP Top 10 | MCP secures the protocol; AST10 secures what skills do with that protocol |
| ASVS v5 | AST10 produces skill-specific verification requirements mappable to ASVS chapters |
| SAMM v3 | AST10 contributes agentic skill maturity practices to the SAMM governance stream |
| NIST AI RMF | AST10 maps to the GOVERN, MAP, MEASURE, and MANAGE functions |
| ISO 42001 | AST10 provides AI management system controls for the skill execution layer |
- Review this document and the complete Top 10 detail pages for full risk descriptions, attack scenarios, and OWASP mappings.
- Conduct a skill inventory across all agent platforms in use — treat this as an immediate priority given active exploitation confirmed in 2026.
- Use the Security Assessment Checklist for reviewing installed skills.
- Implement the governance framework described in AST09: inventory, approval workflow, audit logging, and agentic identity controls.
- Subscribe to ClawHub, skills.sh, and platform-specific security advisories.
- Least privilege: Declare a minimal permission manifest; request only what your skill genuinely needs (AST03).
- Safe parsing: Use safe YAML/JSON loaders; never deserialize untrusted skill configs without sandboxing (AST05).
- Sign your skills: Implement ed25519 signing before publication; include
content_hashin your manifest (AST01/AST02). - Pin dependencies: Lock all nested dependencies to immutable hashes — never version ranges (AST07).
- Honest metadata: Accurately declare
risk_tier, permissions, andrequires; do not understate scope (AST04). - Protect identity files: Never request write access to
SOUL.md,MEMORY.md, orAGENTS.mdunless your skill's core function requires it — and document why (AST03).
- Default sandbox: Make container/Docker isolation the default for skill execution; make host-mode an explicit opt-in (AST06).
- Safe deserialization: Disable dangerous YAML/JSON tags in all skill loaders by default; validate against a schema before execution (AST05).
- Registry scanning: Implement behavioral scanning at publish time and at install time; pattern matching alone is insufficient (AST08).
- Provenance infrastructure: Support the Universal Skill Format; implement Merkle-root transparency logs for your registry (AST01/AST02/AST10).
- Audit logging: Emit structured logs for all skill actions (file access, shell commands, network calls, memory writes) (AST09).
- Trust prompts: Do not allow repository-controlled configuration to execute before explicit user trust confirmation (AST02).
| Role | Primary Concerns | Key AST Risks |
|---|---|---|
| AI Platform Developers | Secure skill runtimes, registries, installers, and CI/CD integration | AST01, AST02, AST05, AST06, AST08 |
| AppSec / Product Security | Govern skills in enterprise deployments; review skill PRs | AST03, AST04, AST07, AST09 |
| Skill Authors | Write safe manifests, scripts, and metadata; ship signable packages | AST03, AST04, AST05, AST07 |
| GRC / Compliance | Map skill risks to NIST AI RMF, ISO 42001, EU AI Act | AST09, AST10 |
| CISOs / Security Leadership | Understand blast radius, incident scope, and governance gaps | AST02, AST06, AST09 |
| Developers / Engineers | Safely install and use skills without introducing unreviewed risk | AST01, AST02, AST07 |
Status: New Project Proposal — active development Version: 1.0 (2026 Edition) License: Creative Commons Attribution ShareAlike 4.0 (CC-BY-SA-4.0)
| Quarter | Phase | Deliverables |
|---|---|---|
| Q2 2026 | Foundation | GitHub repo launch, OWASP project page, AST01–AST06 full write-ups, incident database |
| Q3 2026 | Completion | AST07–AST10 write-ups, Universal Skill Format v1.0 specification, cheat sheets, v1.0 RC |
| Q4 2026 | Launch | v1.0 release, OWASP flagship project submission, RSA 2026 / OWASP Global AppSec presentations |
- 10 Risk Pages: Full descriptions, platform-specific attack scenarios, preventive mitigations, OWASP/NIST/CVE mappings, real-world evidence citations.
- Platform Matrix: Metadata formats, verification hooks, scanning capabilities, and governance options per platform (OpenClaw, Claude Code, Cursor, VS Code).
- Universal Skill Format Specification: Proposed YAML standard that normalizes security properties across all platforms, directly mitigating AST10.
- Cheat Sheets: Quick-reference security controls for developers, AppSec teams, and GRC — one page per audience.
- Security Assessment Checklist: Structured review process for evaluating individual skills before installation.
- Incident Database: Curated, citable record of real-world skill security incidents with technical analysis.
- Slide Deck: Conference-ready presentation targeting RSA 2026 and OWASP Global AppSec.
- Agent skills across all major platforms:
- OpenClaw:
SKILL.md(YAML frontmatter + Markdown),SOUL.md,MEMORY.md - Claude Code:
skill.json/ YAML +scripts/,.claude/settings.json, hooks - Cursor / Codex:
manifest.json+ handler scripts - VS Code:
package.json+ extension contributions
- OpenClaw:
- All 10 risks: AST01 (Malicious Skills) through AST10 (Cross-Platform Reuse)
- Platform-specific attack scenarios with universal mitigations
- Universal Skill Format proposal as the AST10 solution
- Protocol-layer risks → covered by OWASP MCP Top 10
- LLM / model-layer risks → covered by OWASP LLM Top 10
- Scanner and tool implementation → guidance only; not a product
- Non-agentic plugins, browser extensions, or traditional package ecosystems
- Model training and fine-tuning security
Ken Huang — OWASP AIVSS Lead, Agentic AI Security Researcher
- OpenClaw threat modeling and skill security scanning research
- RSA / OWASP conference speaker on AI security
| Channel | Purpose |
|---|---|
| GitHub Issues | Risk suggestions, new attack scenarios, mitigation proposals |
| GitHub PRs | Content contributions, platform-specific examples, translations |
| Goal | Metric | Target |
|---|---|---|
| v1.0 Release | Complete 10 risks + full OWASP/NIST mappings | Q3 2026 |
| OWASP Flagship | Project review and approval | Q4 2026 |
| Conference Adoption | Presentations accepted | 3+ (RSA, OWASP Global AppSec) |
| Industry Adoption | Registries implementing Universal Skill Format | 2+ major registries |
- Snyk ToxicSkills (Feb 5, 2026) — First comprehensive security audit of AI agent skill ecosystem; 3,984 skills scanned across ClawHub and skills.sh. https://snyk.io/blog/toxicskills-malicious-ai-agent-skills-clawhub/
- Snyk: From SKILL.md to Shell Access (Feb 3, 2026) — Threat model for agent skills; lethal trifecta framework. https://snyk.io/articles/skill-md-shell-access/
- Check Point Research: Caught in the Hook (Feb 25, 2026) — CVE-2025-59536 (CVSS 8.7) and CVE-2026-21852 (CVSS 5.3) in Claude Code. https://research.checkpoint.com/2026/rce-and-api-token-exfiltration-through-claude-code-project-files/
- Antiy CERT: ClawHavoc Campaign Analysis (Feb 2026) — 1,184 malicious skills;
Trojan/OpenClaw.PolySkillclassification. - Oasis Security: ClawJacked (Feb 26, 2026) — CVE-2026-28363 (CVSS 9.9); WebSocket brute-force against local OpenClaw instances.
- SecurityScorecard (Feb 2026) — 135,000+ OpenClaw instances publicly exposed; 53,000+ correlated with prior breach activity.
- Snyk: 280+ Leaky Skills (Feb 5, 2026) — API key and PII exposure across ClawHub. https://snyk.io/blog/
- Snyk: Why Your Skill Scanner Is Just False Security (Feb 11, 2026) — Pattern-matching scanner limitations. https://snyk.io/blog/skill-scanner-false-security/
- Cisco State of AI Security 2026 — Comprehensive AI threat landscape; agentic AI proliferation and governance gap. https://blogs.cisco.com/ai/cisco-state-of-ai-security-2026-report
- Microsoft Defender Security Research Team (Feb 2026) — OpenClaw enterprise security advisory.
- BlueRock Security (2026) — 7,000+ MCP server analysis; 36.7% SSRF-vulnerable.
- Bitdefender (Feb 2026) — Enterprise telemetry on shadow AI / OpenClaw deployment.
- Hudson Rock (Feb 2026) — Vidar infostealer variants targeting OpenClaw identity files.
- IBM X-Force 2025 Threat Intelligence Index — AI supply chain risk baseline.
- OWASP AIVSS Project (2025) — https://aivss.owasp.org
- OWASP LLM Top 10 (2025) — https://owasp.org/www-project-top-10-for-large-language-model-applications/
- OWASP Agentic AI Top 10 (Dec 2025) — https://owasp.org/www-project-agentic-ai-threats/
- NIST AI RMF — https://airc.nist.gov/
- ISO/IEC 42001 (AI Management System) — https://www.iso.org/standard/81230.html
- EU AI Act (enforced Aug 2026) — https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32024R1689
- NIST / CAISI Federal Register RFI on AI Agent Security (Jan 8, 2026) — https://www.federalregister.gov/documents/2026/01/08/2026-00206/
- "Prompt Injection Attacks on Agentic Coding Assistants" (arXiv:2601.17548)
- snyk-labs/toxicskills-goof — Real malicious skill samples for scanner testing. https://github.com/snyk-labs/toxicskills-goof
- openclaw/openclaw Issue #10827 — Skill supply-chain security: provenance tracking and permission manifests proposal. openclaw/openclaw#10827
- Website: https://owasp.github.io/www-project-agentic-skills-top-10/
- GitHub: https://github.com/OWASP/www-project-agentic-skills-top-10
- OWASP Project Page: https://owasp.org/www-project-agentic-skills-top-10
- Full Risk Documentation: top10.md
- Project Proposal: proposal.md
- Security Assessment Checklist: checklist.md
- Universal Skill Format Specification: universal-skill-format.md
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
You are free to share and adapt this material for any purpose, provided you give appropriate credit, provide a link to the license, indicate if changes were made, and distribute your contributions under the same license.
For questions, suggestions, or to get involved:
- Open an issue on GitHub (link above when available)
Last updated: March 2026. This document reflects confirmed incidents, published CVEs, and research available as of that date. The threat landscape is evolving rapidly — contributions and corrections are welcome.