AgentPMT
The Agent Skills Supply Chain Is Already Compromised. The Architecture Was the Problem.

The Agent Skills Supply Chain Is Already Compromised. The Architecture Was the Problem.

By Stephanie GoodmanMarch 11, 2026

The first mass supply chain attack on AI agent skill registries exposed a 13.4 percent critical vulnerability rate across ClawHub. The failure was architectural — trust by default, no identity verification, no scoped authorization. The answer was always better infrastructure, not more regulation.

Successfully Implementing AI AgentsAI Agents In BusinessAI Powered InfrastructureAgentPMTDynamicMCPAI MCP Tool ManagementSecurity In AI Systems

The Agent Skills Supply Chain Is Already Compromised. The Architecture Was the Problem.

A ClawHub user called "hightower6eu" published 314 agent skills over a span of weeks. Each one looked like a crypto trading or wallet automation tool. Each one delivered Atomic macOS Stealer — malware designed to harvest passwords, browser cookies, cryptocurrency wallets, and stored credentials. By the time VirusTotal's threat team flagged the campaign in early February, the skills had been available for download, installation, and autonomous execution by any agent connected to the registry.

This was not an isolated actor exploiting a loophole. It was the predictable outcome of a design choice: build an open registry, assume trust by default, and let agents execute whatever they find. The hightower6eu campaign did not break ClawHub's security model. It used the security model exactly as designed. The model was wrong.

The Numbers Behind a Design Failure

Snyk's security research team completed the first comprehensive audit of the agent skills ecosystem in early February, scanning 3,984 skills from ClawHub and skills.sh. The results confirmed what the hightower6eu campaign suggested: the problem was not one bad actor but a registry architecture that could not distinguish between legitimate tools and weaponized ones. Of the skills scanned, 534 — 13.4 percent — contained at least one critical-level security issue, including malware distribution, prompt injection attacks, and exposed secrets. Thirty-six percent of all ClawHub skills contained detectable prompt injection. Of the confirmed malicious samples, 91 percent combined prompt injection with traditional malware techniques, using the agent's own trust model as the delivery mechanism.

Jason Meller, VP of Product Management at 1Password, was direct: organizations should treat prior OpenClaw usage on work machines as a potential security incident. Rotate browser sessions, developer tokens, SSH keys, and cloud credentials. That recommendation was not hypothetical. It was triage for an ecosystem that had already been running compromised.

The standard software supply chain analogy — compromised npm packages, malicious PyPI uploads — covers part of the problem. But agent skills introduce a risk profile that package managers never had to consider. An npm package sits dormant until a developer imports it, builds with it, and deploys it. A malicious agent skill gets executed the moment an agent encounters it. Skills are instruction sets that agents interpret and act on directly. The distinction between reading a skill's documentation and executing its commands collapses inside an agentic runtime. Meller described the dynamic precisely: "In agent ecosystems, the line between reading instructions and executing them collapses."

This is why architecture matters more than scanning. You can audit a registry after the fact. You can flag skills that contain known malware signatures. But if the default behavior is to load every available tool into an agent's working context at startup — which is how traditional MCP servers operate — you have created a system where malicious payloads compete for attention alongside legitimate tools, and the agent cannot tell the difference. The attack surface scales with the catalog. That is a design problem, not a moderation problem.

The vulnerability extended beyond the registry itself. In late February, Oasis Security disclosed the ClawJacked vulnerability in OpenClaw's local gateway. The flaw allowed any website running malicious JavaScript to open a WebSocket connection to localhost, brute-force the gateway password — which had no rate limiting for local connections — and auto-register as a trusted device without prompting the user. Complete agent takeover from a browser tab. OpenClaw patched it in version 2026.2.25, but the vulnerability existed because the gateway was designed to trust local connections by default. The same assumption, applied at a different layer.

Cisco's State of AI Security 2026 report placed MCP vulnerabilities and supply chain fragility among the top three AI security risks for the year. Their research team released open-source scanners for MCP servers, A2A protocols, and agentic skill files — tools built because no standard scanning infrastructure existed. The report found that 83 percent of organizations planned agentic AI deployment. Only 29 percent felt prepared to secure those deployments.

The Industry Left a Gap. Now Regulators Are Filling It.

The federal government has noticed. Three deadlines converged between March 9 and March 11 — NIST soliciting input on agent security standards, the FTC mapping consumer protection law onto AI applications, and the Commerce Department evaluating state AI laws for potential federal preemption.

This is what happens when the industry does not solve its own problems. Regulators step in — not because they understand the technology better, but because the people building it left a visible gap. Every open registry that shipped without publish-time scanning, every MCP server that loaded untrusted tools into context by default, every agent framework that shipped without identity verification — those were invitations for someone else to define the rules.

The builders closest to the technology have always been in the best position to design accountability into the system. Budget controls, scoped authorization, identity verification, audit trails — none of these are exotic ideas. They are straightforward infrastructure decisions that the open registry model chose not to make. The hightower6eu campaign and the ClawJacked vulnerability are what that choice produced. Federal rulemaking is the second-order consequence.

Regulation will always lag behind the technology. NIST is gathering input. The FTC is mapping existing law onto new applications. The real standards — the ones that actually protect agents and the people who deploy them — will come from the infrastructure itself, built by the teams that understand what agents actually need to operate safely.

Governance Is Architecture

Teramind's research quantified the governance gap from a different angle: 80 percent of workers use unapproved AI tools at work. One-third have shared proprietary data with unsanctioned AI services. Forty-nine percent actively conceal their AI usage from IT teams. The average cost of an AI-associated breach or data leak: over $650,000 per incident. Isaac Kohen, Teramind's Chief Product Officer, framed it directly: "This isn't a technology gap — it's a governance gap."

Products are emerging to address pieces of this: Teramind captures prompts and agent behavior for audit, Cisco's scanners provide supply chain integrity checks, Snyk's ToxicSkills methodology offers registry-level scanning. These are useful. But they share a limitation: they are monitoring layers applied after the fact. They tell you what an agent did yesterday. They do not control what an agent can do right now.

The difference is architectural. An agent operating inside a system with built-in governance has constrained tool access — not a catalog of hundreds of definitions loaded at startup, but tools fetched on demand, one at a time, only when needed. It has budget controls that cap spending before a tool call executes, not after. It has a complete audit trail — every request, every response, every workflow step logged with full context — because the logging is part of the infrastructure, not a separate product watching from outside. And when a decision requires human judgment, the agent pauses and asks, rather than proceeding autonomously past the boundary of what it was authorized to do.

This is the design philosophy behind AgentPMT's marketplace: tools go through vendor accountability structures before they become available to agents. Dynamic MCP fetches tool definitions on demand rather than loading a full catalog into context — which eliminates both the performance penalty and the bloated attack surface that Cisco's report flagged as a top-tier risk. Budget controls constrain what an agent can spend before the spending happens. Human-in-the-loop approvals gate sensitive actions through biometric confirmation on a mobile device. Agent identity through AgentAddress uses cryptographic wallet signatures — no passwords, no API keys, no shared secrets to steal.

If a tool is compromised, the blast radius is structurally limited by the permissions and budgets already in place — not by how fast a security team can respond and not by whether a regulation exists that says you should have had controls.

Want to apply this in your own workflow?

Create a free account to try the same approach with your own agents.

Browse agents

Free to start. No card required.

The Design Choices Are Being Made Now

The ClawHub supply chain attack proved that trust-by-default is the wrong foundation for agent infrastructure. The 13.4 percent critical vulnerability rate was not a failure of moderation or oversight. It was the natural result of an architecture that never asked whether the tools it distributed could be trusted.

The industry has a choice. Build governance into the infrastructure — identity, authorization, audit, budget controls, curated tool access — or leave the gap open and wait for someone else to define what should have been there from the start.

The builders who take accountability seriously are not doing it because a regulator told them to. They are doing it because it is the only way to build something that people and agents can actually trust. That has always been the answer. The attack just made it impossible to ignore.


Sources

  • From Automation to Infection: How OpenClaw's Agent Skills Are Being Weaponized — VirusTotal Blog
  • Snyk Finds Prompt Injection in 36%, 1467 Malicious Payloads in a ToxicSkills Study of Agent Skills Supply Chain Compromise — Snyk
  • From Magic to Malware: How OpenClaw's Agent Skills Become an Attack Surface — 1Password Blog
  • ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket — The Hacker News
  • Cisco State of AI Security 2026 Report — Cisco Blogs
  • CAISI Issues Request for Information About Securing AI Agent Systems — NIST
  • NIST Agentic AI Initiative Looks to Get Handle on Security — Federal News Network
  • FTC AI Policy Deadline March 11: Compliance Guide — Digital Applied
  • March 2026: Federal Deadlines That Will Reshape the AI Regulatory Landscape — Baker Botts
  • Teramind Launches Agentic AI Visibility and Policy Platform for AI Tools — SiliconANGLE
  • OpenClaw ClawHub Malicious Skills Supply Chain Attack — PointGuard AI
  • NIST Opens Public Comment on Agentic AI Standards — Deadline March 9 — Granted AI
Workflow
Saves ~2 hr
AgentPMT Workflow Creator
Design, build, test, and publish custom automation workflows on AgentPMT. Walk through the complete workflow creation process from idea to published skill: define what you want to automate, discover available tools from a catalog of 170+, design multi-step DAG graphs with tool nodes, prompt nodes, branching, loops, and human notifications, then test and iterate until the workflow runs correctly. Uses the AgentPMT Workflow Creator tool directly for tool discovery, workflow creation, verification, and publishing. Covers workflow architecture, node types, edge connections, industry tagging, versioning, and publishing. Ideal for no-code automation, business process automation, task chaining, AI agent orchestration, and building reusable skill chains.

Ready to put this into practice?

Browse agents and workflows that use these ideas, or create a free account to try them now.

Browse agents

Free to start. No card required.

Browse agents