| name | update-threat-db |
|---|---|
| description | Research and update the AI agent security threat intelligence database |
| argument-hint | [--source <url>] |
Research and update the AI agent security threat intelligence database with the latest threats, CVEs, malicious skills, and campaigns.
Time: 3-8 minutes | Scope: examples/commands/resources/threat-db.yaml
Requires Perplexity MCP (or manual web search). Run monthly or after major security advisories.
You are a threat intelligence analyst specializing in AI coding agent security. Research the latest threats and update the threat database.
Read the current threat database:
Read examples/commands/resources/threat-db.yaml
Note:
- Current
versionandupdateddate - Number of malicious authors, skills, CVEs, campaigns
- Most recent entries to avoid duplicates
Run 4 targeted Perplexity searches (parallel when possible):
Search 1: New malicious skills & campaigns
Query: "malicious AI agent skills ClawHub OpenClaw skills.sh 2026 new campaigns malware supply chain"
Focus: New malicious skill names, authors, campaigns not already in threat-db.yaml
Search 2: New MCP server CVEs
Query: "MCP server CVE vulnerability 2025 2026 model context protocol security advisory"
Focus: New CVEs for MCP servers, SDK vulnerabilities, transport-level flaws
Search 3: New attack techniques
Query: "AI coding agent attack prompt injection Claude Code Cursor supply chain security research 2026"
Focus: New attack vectors, techniques, research papers
Search 4: New defensive tools & blocklists
Query: "MCP security scanner tool mcp-scan alternative AI agent skills security scanning 2026"
Focus: New scanning tools, blocklists, defensive frameworks
If Perplexity MCP is unavailable, use WebSearch for each query.
For each finding from Phase 2:
-
Check if already in threat-db.yaml — skip duplicates
-
Verify source credibility — prefer: CVE databases, security vendor blogs, peer-reviewed research
-
Categorize — which section does it belong to?
malicious_authors— new confirmed malicious publishersmalicious_skills— new confirmed malicious skill/package namesmalicious_skill_patterns— new prefix patterns for wildcard matchingcve_database— new CVEs with component, severity, fixed_inminimum_safe_versions— update if new patches availableiocs— new C2 IPs, exfil URLs, malware hashescampaigns— new coordinated campaignsattack_techniques— new documented attack vectorsscanning_tools— new tools or major updatesdefensive_resources— new frameworks, blocklists
-
Assess risk level:
critical— confirmed malicious, active exploitationhigh— confirmed vulnerable, exploit availablemedium— theoretical risk, no known exploitationlow— informational
Apply changes following these rules:
- Bump version — increment minor (e.g. 2.0.0 → 2.1.0) for new entries, major for schema changes
- Update
updateddate — set to today - Add new sources — add any new research sources to the
sourceslist - Maintain YAML validity — use single quotes for patterns containing backslashes
- Preserve existing entries — never remove entries unless confirmed false positive
- Follow existing format — match the structure of existing entries exactly
Important: After editing, validate YAML:
python3 -c "import yaml; yaml.safe_load(open('examples/commands/resources/threat-db.yaml')); print('YAML valid')"Check if new CVEs should also be added to the security hardening guide:
# Count current CVEs in threat-db vs security-hardening
grep -c "id:" examples/commands/resources/threat-db.yaml
grep -c "CVE-" guide/security-hardening.mdIf major new CVEs found (severity critical/high):
- Consider adding to
guide/security-hardening.mdCVE table - Update
minimum_safe_versionsif new patches released
## Threat Database Update Report
**Date**: [timestamp]
**Previous version**: [old version]
**New version**: [new version]
### Changes Summary
| Category | Added | Updated | Total |
|----------|-------|---------|-------|
| Malicious authors | +X | ~X | XX |
| Malicious skills | +X | ~X | XX |
| CVEs | +X | ~X | XX |
| Campaigns | +X | ~X | XX |
| IOCs | +X | ~X | XX |
| Attack techniques | +X | ~X | XX |
| Scanning tools | +X | ~X | XX |
### New Entries
[List each new entry with source and risk level]
### Notable Findings
[Highlight anything particularly important or urgent]
### No Changes Needed
[If nothing new found, explain what was searched and confirmed up-to-date]
### Next Steps
- [ ] Run `/security-check` to test against updated database
- [ ] Update `guide/security-hardening.md` if new critical CVEs
- [ ] Commit: `docs(security): update threat-db vX.Y.Z — [summary]`
$ARGUMENTS