- Add threat-db.yaml v2.0.0 with 63 malicious skills, 22 CVEs, 4 campaigns - Add /security-check, /security-audit, /update-threat-db slash commands - Add Snyk ToxicSkills evaluation (58th resource evaluation) - Fix cheatsheet: add Alt+T to keyboard shortcuts table, add /fast and /debug commands - Update Features Meconnues table with Agent Teams and Auto-Memories - Clean up cheatsheet.md.bak - Bump version to 3.26.0 Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
5 KiB
Update Threat Database
Research and update the AI agent security threat intelligence database with the latest threats, CVEs, malicious skills, and campaigns.
Time: 3-8 minutes | Scope: examples/commands/resources/threat-db.yaml
Requires Perplexity MCP (or manual web search). Run monthly or after major security advisories.
Instructions
You are a threat intelligence analyst specializing in AI coding agent security. Research the latest threats and update the threat database.
Phase 1: Current State Assessment
Read the current threat database:
Read examples/commands/resources/threat-db.yaml
Note:
- Current
versionandupdateddate - Number of malicious authors, skills, CVEs, campaigns
- Most recent entries to avoid duplicates
Phase 2: Research New Threats
Run 4 targeted Perplexity searches (parallel when possible):
Search 1: New malicious skills & campaigns
Query: "malicious AI agent skills ClawHub OpenClaw skills.sh 2026 new campaigns malware supply chain"
Focus: New malicious skill names, authors, campaigns not already in threat-db.yaml
Search 2: New MCP server CVEs
Query: "MCP server CVE vulnerability 2025 2026 model context protocol security advisory"
Focus: New CVEs for MCP servers, SDK vulnerabilities, transport-level flaws
Search 3: New attack techniques
Query: "AI coding agent attack prompt injection Claude Code Cursor supply chain security research 2026"
Focus: New attack vectors, techniques, research papers
Search 4: New defensive tools & blocklists
Query: "MCP security scanner tool mcp-scan alternative AI agent skills security scanning 2026"
Focus: New scanning tools, blocklists, defensive frameworks
If Perplexity MCP is unavailable, use WebSearch for each query.
Phase 3: Analyze & Deduplicate
For each finding from Phase 2:
-
Check if already in threat-db.yaml — skip duplicates
-
Verify source credibility — prefer: CVE databases, security vendor blogs, peer-reviewed research
-
Categorize — which section does it belong to?
malicious_authors— new confirmed malicious publishersmalicious_skills— new confirmed malicious skill/package namesmalicious_skill_patterns— new prefix patterns for wildcard matchingcve_database— new CVEs with component, severity, fixed_inminimum_safe_versions— update if new patches availableiocs— new C2 IPs, exfil URLs, malware hashescampaigns— new coordinated campaignsattack_techniques— new documented attack vectorsscanning_tools— new tools or major updatesdefensive_resources— new frameworks, blocklists
-
Assess risk level:
critical— confirmed malicious, active exploitationhigh— confirmed vulnerable, exploit availablemedium— theoretical risk, no known exploitationlow— informational
Phase 4: Update threat-db.yaml
Apply changes following these rules:
- Bump version — increment minor (e.g. 2.0.0 → 2.1.0) for new entries, major for schema changes
- Update
updateddate — set to today - Add new sources — add any new research sources to the
sourceslist - Maintain YAML validity — use single quotes for patterns containing backslashes
- Preserve existing entries — never remove entries unless confirmed false positive
- Follow existing format — match the structure of existing entries exactly
Important: After editing, validate YAML:
python3 -c "import yaml; yaml.safe_load(open('examples/commands/resources/threat-db.yaml')); print('YAML valid')"
Phase 5: Update Dependent Files (if needed)
Check if new CVEs should also be added to the security hardening guide:
# Count current CVEs in threat-db vs security-hardening
grep -c "id:" examples/commands/resources/threat-db.yaml
grep -c "CVE-" guide/security-hardening.md
If major new CVEs found (severity critical/high):
- Consider adding to
guide/security-hardening.mdCVE table - Update
minimum_safe_versionsif new patches released
Phase 6: Summary Report
Output Format
## Threat Database Update Report
**Date**: [timestamp]
**Previous version**: [old version]
**New version**: [new version]
### Changes Summary
| Category | Added | Updated | Total |
|----------|-------|---------|-------|
| Malicious authors | +X | ~X | XX |
| Malicious skills | +X | ~X | XX |
| CVEs | +X | ~X | XX |
| Campaigns | +X | ~X | XX |
| IOCs | +X | ~X | XX |
| Attack techniques | +X | ~X | XX |
| Scanning tools | +X | ~X | XX |
### New Entries
[List each new entry with source and risk level]
### Notable Findings
[Highlight anything particularly important or urgent]
### No Changes Needed
[If nothing new found, explain what was searched and confirmed up-to-date]
### Next Steps
- [ ] Run `/security-check` to test against updated database
- [ ] Update `guide/security-hardening.md` if new critical CVEs
- [ ] Commit: `docs(security): update threat-db vX.Y.Z — [summary]`
$ARGUMENTS