New Research: Supply Chain Attack on Axios Pulls Malicious Dependency from npm.Details →
Socket
Book a DemoSign in
Socket

agent-toolbox

Package Overview
Dependencies
Maintainers
1
Versions
1
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

agent-toolbox

Cross-tool registry for agent skills, MCP servers, and hooks with provenance tracking and automated security vetting.

latest
Source
npmnpm
Version
0.2.0
Version published
Maintainers
1
Created
Source

agent-toolbox

SUL-1.0 license Release model GitHub issues Cisco AI Defense Ask DeepWiki

CI CodeQL Skill Security Scan

Secure infrastructure for the AI agent skill ecosystem.

A curated, security-vetted registry of agent skills that works across
Claude Code, Codex, Gemini CLI, Cursor, OpenCode, and more.

Sponsor

Buy Me A Coffee

What is agent-toolbox?

AI coding assistants increasingly rely on agent skills, plugins, hooks, and MCP servers.

But the ecosystem has two major problems:

  • Fragmentation — standards like Agent Skills define a common format, but don't guarantee that the content itself is tool-neutral
  • Security risks — agent skills form a new software supply chain

Recent research highlights the scale of the issue:

  • Snyk found 13.4% of ~4,000 scanned agent skills contained critical security issues
    • documented attacks include prompt injection, credential theft, and malware distribution
  • 1Password discovered the top-downloaded skill on ClawHub was a multi-stage infostealer — the "Twitter" skill embedded a fake "required dependency" that led users through a 5-stage delivery chain ending in a macOS binary with Gatekeeper bypass; VirusTotal confirmed the binary as infostealing malware targeting browser sessions, credentials, developer tokens, and SSH keys
    • staged delivery: fake prerequisite → staging page → obfuscated command → second-stage script → binary execution with quarantine removal
    • coordinated campaign: subsequent reporting revealed hundreds of skills distributing macOS malware via ClickFix-style instructions — not an isolated upload
  • Cisco's AI Threat Research team proved the #1 most-downloaded skill on OpenClaw's registry was functional malware — their Skill Scanner found 9 security findings (2 critical, 5 high severity) in the "What Would Elon Do?" skill:
    • silent data exfiltration: the skill executed curl commands sending user data to an attacker-controlled server without any user notification
    • prompt injection: forced the AI assistant to bypass its own safety guidelines and execute commands without user consent
    • command injection: embedded bash commands executed through the skill's workflow
    • tool poisoning: malicious payloads concealed within the skill file itself
    • the malicious skill's popularity had been artificially inflated to rank #1 — demonstrating that bad actors can manufacture trust in unvetted registries

In many ecosystems, a SKILL.md file is effectively an installer for arbitrary logic.

agent-toolbox treats agent skills as a new software supply chain.

It provides a curated, security-scanned catalog of agent components,
with cross-tool compatibility and automated provenance tracking.

What You Get

You're browsing plugin marketplaces. Saving "awesome" lists from the community.
You see impressive demos everywhere — but don't want to risk navigating a minefield of prompt injections, credential theft, and malware to boost your productivity.

agent-toolbox takes care of the hard part. Just remember this: bunx agent-toolbox install. Done.

agent-toolbox provides:

  • 110+ curated agent skills across multiple domains
  • cross-tool compatibility for major AI coding assistants
  • automated security scanning
  • provenance tracking for upstream sources
  • flexible installation filters

Think of it as:

Homebrew + Sigstore + npm audit for AI agent skills

Use Cases

agent-toolbox can be used to:

  • install curated agent skills for Claude Code, Codex, Cursor, or Gemini CLI
  • share a standardized skill catalog across teams
  • audit third-party skills before installing them
  • maintain secure agent tooling infrastructure
  • experiment with cross-tool agent ecosystems

Getting Started

Install Skills

# Install all skills for a target
bunx agent-toolbox install --target claude-code

# Filter by domain
bunx agent-toolbox install --target gemini --domain devops

# Filter by subdomain
bunx agent-toolbox install --target gemini --domain devops --subdomain ci-cd

# Use a curated preset
bunx agent-toolbox install --target cursor --preset devops-essentials

# Install specific skills
bunx agent-toolbox install --target claude-code --skill git-master --skill docs-writer

# Filter by framework or tag
bunx agent-toolbox install --target codex --framework nextjs
bunx agent-toolbox install --target gemini --tag yaml

# Preview what would be installed
bunx agent-toolbox install --target gemini --domain devops --dry-run

[!TIP] npm users: Replace bunx with npx.

[!NOTE] All filters compose with AND logic. Default (no filters) installs everything.

Browse the Catalog

The catalog currently contains 110+ skills across 10 domains.

Browse by domain:
View the full catalog →

Skills are curated from leading open-source projects and adapted
for cross-tool compatibility.

Supported Targets

TargetArtifact FormatStatus
Claude Code.claude/ skills + pluginsImplemented
OpenCodeskills/ with SKILL.mdImplemented
Gemini CLIgemini-extension.json + skillsImplemented
Cursor.cursor/ compatible artifactsImplemented
CodexAgent skill directoriesImplemented

Architecture

agent-toolbox/
├── catalog/                          # Neutral source-of-truth
│   ├── skills/                       # Flat — one dir per skill, taxonomy via frontmatter
│   ├── agents/
│   ├── commands/
│   ├── hooks/
│   ├── mcp/
│   ├── lsp/
│   └── metadata/                     # Taxonomy, presets, and generated index
│       ├── taxonomy.yaml             # Controlled vocabulary (domains + subdomains)
│       ├── presets.yaml              # Curated install bundles
│       ├── upstream-sources.yaml     # Ported/adapted skill upstream mappings
│       ├── skill-index.json          # Auto-generated aggregated skill metadata
│       └── skill-index.toon          # Auto-generated TOON format for LLM consumption
├── src/                              # Bun-first TS toolchain
│   ├── catalog/                      # Skill scanning, validation, index building
│   ├── cli/                          # install/build/validate entrypoints
│   ├── generators/                   # claude-code / opencode / cursor / codex / gemini
│   ├── install/                      # Selective install engine + filter composition
│   ├── mappers/                      # Tool/event/model mapping layers
│   └── schemas/                      # Zod schemas for catalog + targets + install
├── templates/                        # Target-specific render templates
├── dist/
│   ├── targets/                      # Runtime artifacts per tool
│   │   ├── claude-code/
│   │   ├── opencode/
│   │   ├── cursor/
│   │   ├── codex/
│   │   └── gemini/
│   └── marketplace/                  # Catalog artifacts (Claude-specific)
└── tests/
    ├── unit/                         # Schema, taxonomy, frontmatter, scanner, filter
    ├── integration/                  # Generator and install pipeline tests
    └── matrix/                       # Cross-target verification

Workflow

  • Catalog — neutral SKILL.md definitions with frontmatter metadata (domain, tags, frameworks, author, lastUpdated, provenance).
  • Generators — transform catalog into tool-specific artifacts
  • Install engine — deploy skills with flexible filtering

Security

Every skill in the catalog is automatically scanned using Cisco Skill Scanner with a custom strict-based policy.

The security pipeline combines multiple detection engines:

  • Static analysis — YAML + YARA pattern matching, bytecode verification, shell pipeline taint analysis
  • Behavioral analysis — AST-based dataflow tracking from sources to sinks across multiple files
  • LLM semantic analysis — OpenAI gpt-5.4 evaluates code intent against Cisco's AITech threat taxonomy
  • Meta-analysis — Second-pass false positive filtering with cross-finding correlation
  • VirusTotal — Hash-based binary malware scanning

Security findings are published through GitHub Code Scanning.

Monthly full-scan reports are archived in docs/security-reports/.

For full details, see SECURITY.md.

[!IMPORTANT] To report vulnerabilities:

Support

[!NOTE] If you find agent-toolbox useful, consider supporting the project.

Maintaining agent-toolbox requires ongoing work including catalog review, security analysis, and cross-tool compatibility maintenance.

Parts of the security pipeline currently rely on personally funded infrastructure, including:

  • OpenAI API usage for LLM-based security analysis
  • Rate-limited VirusTotal public API for malware detection

Support helps sustain these security capabilities and expand the scanning infrastructure.

Individual Support

GitHub Sponsors:
Sponsor

Buy Me a Coffee:
Buy Me A Coffee

Corporate Sponsorship

Organizations building or relying on AI coding assistants such as Claude Code, Codex, Cursor, or Gemini CLI may consider sponsoring the project.

Corporate sponsorship helps sustain:

  • security scanning infrastructure
  • catalog curation and review
  • cross-tool compatibility maintenance
  • long-term ecosystem development

[!TIP] Corporate sponsors may be listed in the README.

Sponsors

Contributing

Contributions are welcome. Please read CONTRIBUTING.md for guidelines on setting up a development environment, submitting changes, and adding catalog skills.

License

agent-toolbox is released under the Sustainable Use License 1.0.

[!NOTE] The project is free to use for individuals, research, and open-source development. The Sustainable Use License is designed to enable broad community use while supporting the long-term sustainability of the project and its maintenance.

Commercial Licensing

agent-toolbox aims to serve as secure infrastructure for the emerging AI agent skill ecosystem.

Organizations integrating or distributing agent-toolbox as part of a commercial AI product or hosted platform may require a commercial license.

Examples include:

  • bundling agent-toolbox within an AI coding assistant
  • integrating the catalog into a proprietary developer tool
  • operating a hosted service built on agent-toolbox infrastructure

Commercial licenses provide:

  • rights for commercial distribution
  • proprietary product integration
  • optional ecosystem partnership recognition

If your organization is interested in integrating agent-toolbox into a commercial product or platform, please reach out to contact@yunseo.kim.

Keywords

opencode

FAQs

Package last updated on 10 Mar 2026

Did you know?

Socket

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts