Skip to main content

Security scanner for AI agent plugins, skills, and MCP packages

Project description

AgentSift

Security scanner for AI agent plugins, skills, and MCP packages

npm audit for the AI agent ecosystem

Features | Quick Start | Ecosystems | Contributing | Roadmap


The Problem

AI agent ecosystems are under attack. The numbers are alarming:

  • 12% of ClawHub packages contain malicious payloads (ClawHavoc incident)
  • 41.7% of 2,890+ OpenClaw skills have serious security vulnerabilities
  • 43% of MCP servers have command injection vulnerabilities
  • 43% of MCP servers have OAuth authentication flaws
  • $16M+ in losses from a single supply chain attack campaign

Traditional security scanners (Snyk, Trivy, Semgrep) were built for traditional software. They cannot detect threats unique to AI agent ecosystems: tool poisoning, prompt injection via plugins, credential theft through MCP servers, and behavioral manipulation of autonomous agents.

AgentSift fills this gap.

Features

  • Static Analysis -- Detect suspicious patterns: obfuscated code, hidden network calls, credential access, crypto wallet targeting
  • Behavioral Sandbox -- Execute plugins in an isolated environment and monitor actual system calls, network connections, and file access
  • Reputation Scoring -- Risk score based on author history, download patterns, code similarity to known malware, and community signals
  • SBOM Generation -- Software Bill of Materials in CycloneDX/SPDX format for compliance
  • CI/CD Integration -- SARIF output for GitHub Advanced Security, GitLab SAST, and other platforms
  • Detection Rules -- Extensible YAML-based rule engine (bring your own rules or use built-in detections)

Quick Start

# Install
pip install agentsift

# Scan a ClawHub skill
agentsift scan clawhub:cryptocurrency-trader

# Scan an MCP package from npm
agentsift scan npm:@modelcontextprotocol/server-postgres

# Scan a local plugin directory
agentsift scan ./my-agent-plugin/

# Scan with full behavioral analysis (slower, more thorough)
agentsift scan --deep clawhub:cryptocurrency-trader

# Output SARIF for CI/CD
agentsift scan --format sarif -o results.sarif clawhub:some-skill

# Generate SBOM
agentsift sbom --format cyclonedx clawhub:some-skill

Supported Ecosystems

Ecosystem Status Description
ClawHub v0.1 OpenClaw skills marketplace
MCP (npm) v0.1 Model Context Protocol servers on npm
MCP (PyPI) v0.2 MCP servers on PyPI
LangChain Hub Planned LangChain tools and chains
CrewAI Tools Planned CrewAI tool packages
Custom v0.1 Any local directory with agent code

How It Works

                    +-----------------+
                    |   agentsift     |
                    |   scan <pkg>    |
                    +--------+--------+
                             |
              +--------------+--------------+
              |              |              |
     +--------v---+  +------v------+  +----v--------+
     |   Static   |  | Behavioral  |  | Reputation  |
     |  Analysis  |  |  Sandbox    |  |  Scoring    |
     +--------+---+  +------+------+  +----+--------+
              |              |              |
              +--------------+--------------+
                             |
                    +--------v--------+
                    |  Risk Score &   |
                    |  Report Output  |
                    |  (JSON/SARIF/   |
                    |   CycloneDX)    |
                    +-----------------+

Static Analysis

Scans source code for patterns known to be associated with malicious AI agent plugins:

  • Network exfiltration: Hidden HTTP calls, DNS tunneling, WebSocket connections to unknown hosts
  • Credential harvesting: Access to environment variables, SSH keys, browser credential stores, crypto wallets
  • Code obfuscation: Base64-encoded payloads, eval()/exec() usage, dynamic imports
  • Prompt injection: Embedded instructions designed to manipulate the host AI agent
  • Privilege escalation: Attempts to escape sandboxes, modify system files, or escalate permissions

Behavioral Sandbox

Executes the plugin in an isolated container and monitors:

  • System calls (via seccomp-bpf)
  • Network connections (DNS queries, HTTP requests, raw sockets)
  • File system access (reads, writes, deletes outside expected paths)
  • Process spawning (unexpected child processes)
  • Resource consumption (CPU, memory, disk anomalies)

Reputation Scoring

Calculates a 0-100 risk score based on:

  • Author account age and verification status
  • Download count and velocity patterns
  • Code similarity to known malicious packages (via fuzzy hashing)
  • Dependency chain analysis
  • Community reports and flags

Detection Rules

AgentSift uses YAML-based detection rules:

# rules/credential-access.yaml
id: AS-001
name: environment-variable-exfiltration
severity: critical
description: Plugin accesses sensitive environment variables and makes network calls
patterns:
  - type: code
    match: "os.environ|process.env"
    context: "network_call_in_same_scope"
  - type: behavior
    match: "dns_query_after_env_read"
tags: [credential-theft, exfiltration]
ecosystems: [clawhub, mcp, npm]

Write custom rules and contribute them back to the community!

CI/CD Integration

GitHub Actions

- name: Scan MCP dependencies
  uses: agentsift/agentsift-action@v1
  with:
    targets: "mcp-packages.json"
    fail-on: "high"

GitLab CI

agentsift-scan:
  image: agentsift/agentsift:latest
  script:
    - agentsift scan --format sarif -o gl-agentsift-report.sarif ./
  artifacts:
    reports:
      sast: gl-agentsift-report.sarif

Comparison with Existing Tools

Feature AgentSift Cisco MCP Scanner Snyk Trivy
AI agent plugin scanning Yes MCP only No No
Behavioral sandbox Yes No No No
ClawHub support Yes No No No
MCP server scanning Yes Yes No No
Prompt injection detection Yes No No No
SBOM generation Yes No Yes Yes
SARIF output Yes No Yes Yes
Custom detection rules Yes Limited No Yes

Project Status

Alpha -- Under active development. APIs may change. Not yet recommended for production use.

See the Roadmap for planned features and milestones.

Contributing

We welcome contributions! See CONTRIBUTING.md for guidelines.

Priority areas:

  • Detection rules for new attack patterns
  • Support for additional ecosystems
  • Behavioral sandbox improvements
  • Documentation and translations

Security

Found a vulnerability in AgentSift itself? See SECURITY.md for responsible disclosure.

License

Apache License 2.0 -- See LICENSE

Acknowledgments

This project is informed by research from:


Built with the belief that AI agents should be safe by default.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

agentsift-0.1.0.tar.gz (37.1 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

agentsift-0.1.0-py3-none-any.whl (33.2 kB view details)

Uploaded Python 3

File details

Details for the file agentsift-0.1.0.tar.gz.

File metadata

  • Download URL: agentsift-0.1.0.tar.gz
  • Upload date:
  • Size: 37.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.3

File hashes

Hashes for agentsift-0.1.0.tar.gz
Algorithm Hash digest
SHA256 082551bee2f40de6260d58cadad6a8b810cae4b49351a60c1fd692ff7ad1b647
MD5 79ddf480363dc6aa92ed3f2b228832be
BLAKE2b-256 eb502831ac165fd8c89808f28973524ecbd3132a6d627aa101f958b5dd21c8bb

See more details on using hashes here.

File details

Details for the file agentsift-0.1.0-py3-none-any.whl.

File metadata

  • Download URL: agentsift-0.1.0-py3-none-any.whl
  • Upload date:
  • Size: 33.2 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.3

File hashes

Hashes for agentsift-0.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 0bec068b22218ec4a2b20316520170e818261c6f732115717c7160701f36906d
MD5 5686137c01f365331e7eba27a72a0972
BLAKE2b-256 9da44504dbd8d372becd19c5bcb59b976313d087ebd11ff7e4bfb7f04ab7221b

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page