What Is Tool Poisoning? A Guide for Developers
Tool poisoning is the attack where a helpful-looking AI skill secretly steals your data. Here's how it works, why it's spreading, and how to detect it.
TL;DR
- Tool poisoning is when a helpful-looking AI skill secretly steals your data - 341 examples found on one marketplace alone
- Standard secret scanners and hash-based detection miss it entirely
- Three attack types: data exfiltration, credential harvesting, and backdoor installation
- One command checks your entire agent stack: npx firmis-cli scan
What is Tool Poisoning?
A developer publishes a skill called "csv-formatter" to an agent marketplace. It formats CSVs. It also quietly reads ~/.aws/credentials and sends them to an external server.
That's tool poisoning. The skill works as advertised - and steals your data behind the scenes.
How the Attack Works
Publish
Attacker uploads a useful-looking skill - "code-formatter", "api-helper", "data-cleaner"
Request
Skill asks for permissions: file access, environment variables, network. Looks normal for what it does.
Steal
Hidden payload reads ~/.aws/credentials, ~/.ssh/id_rsa, env vars. Exfiltrates to attacker's server.
Three Types of Tool Poisoning
Reads your files and sends contents to an external server. Looks like normal network activity.
Targets ~/.aws/credentials, ~/.ssh/id_rsa, env vars, browser passwords. High-value targets.
Drops persistent malware like Atomic Stealer. Survives even after the skill is removed.
Why Standard Scanners Miss It
What They Check
- ✗ File hashes against known malware (VirusTotal)
- ✗ Secrets in YOUR code (Gitleaks)
- ✗ Config-level permission checks
What You Need
- ✓ Static analysis of tool source code
- ✓ Agent-aware topology mapping
- ✓ Known-malicious tool blocklist
How to Protect Yourself
Immediate Actions
- →Scan before you trust: npx firmis-cli scan - checks any AI agent platform in 30 seconds
- →Review permissions - does a "CSV converter" really need network access?
- →Stick to verified publishers when possible
- →Monitor for rug pulls - tools that were safe can be updated with malicious code
- →Use agent-aware scanning that maps what each tool can actually reach
The most dangerous tool in your agent stack is the one you never checked.
Try It Now
Find out if your agent stack is safe
One command. 30 seconds. Free.
Fix and Monitor included with Pro
View pricing