AST07 — Update Drift
Severity: Medium
Platforms Affected: All
Description
Skills are installed and forgotten. Without immutable pinning and automated update verification, deployed skills drift out of sync with known-good versions — either because patches are not applied (leaving known vulnerabilities open) or because auto-update mechanisms blindly apply upstream changes that may themselves be malicious.
Why It’s Unique to Skills
Package update drift is a known risk in traditional software. In skills, it’s amplified by two factors: (1) skills are often installed by individuals without enterprise patch management, and (2) a “fix” version of a skill is itself unverifiable without cryptographic pinning — the attacker can push a “v1.0.1” that looks like a patch but contains a new payload.
Real-World Evidence
- ClawJacked (CVE-2026-28363, CVSS 9.9) and the broader OpenClaw CVE cluster (9 CVEs, 3 with public exploit code): the patch-lag window between disclosure and user update created an active exploitation window. SecurityScorecard confirmed 12,812 OpenClaw instances exploitable via RCE at time of analysis.
- Claude Code CVE-2025-59536: fixed in v1.0.111 (Oct 2025); CVE-2026-21852: fixed in v2.0.65 (Jan 2026). Gap of months between fix and public disclosure — users unaware of risk for the duration.
- OpenClaw’s hot-reload
SkillsWatcherenables real-time skill updates: a compromised upstream skill repository becomes instantly active without requiring agent restart.
Attack Scenarios
Malicious Update
Trusted skill author’s account is compromised; attacker pushes v2.0 with a payload. Auto-updating agents receive it silently.
Patch-Lag Exploitation
CVE is disclosed; attacker weaponizes it before users patch. 12,812 instances exploitable in the OpenClaw case.
Rollback Attack
Attacker forces a downgrade to a known-vulnerable version via dependency resolution manipulation.
Hot-Reload Abuse
Skill directory is writable; attacker modifies SKILL.md mid-session; agent picks up changes without restart.
Preventive Mitigations
- Pin all installed skills to immutable content hashes (
sha256:), not version ranges. - Require cryptographic signature verification on every update — refuse unsigned updates.
- Implement a “freeze” mode for production deployments; prohibit hot-reload in non-development environments.
- Subscribe to registry security advisories and auto-alert on CVE matches for installed skills.
- Enforce a human-in-the-loop approval step for any skill update in enterprise environments.
- Maintain an inventory of installed skills with version, hash, and last-verified timestamp.
OWASP Mapping
- LLM03 (Supply Chain)
- CWE-1329 (Reliance on Component Without Verification)
- ASVS V14.2 (Dependency)
MAESTRO Framework Mapping
| MAESTRO Layer | Layer Name | AST07 Mapping |
|---|---|---|
| Layer 4 | Deployment & Infrastructure | insecure update pipelines, config drift |
| Layer 6 | Security & Compliance | update policy, verification enforcement |
| Layer 7 | Agent Ecosystem | cross-registry trust and update governance |
MAESTRO Layer Details
- Layer 4: Deployment & Infrastructure - unsafe automatic update and runtime drift.
- Layer 6: Security & Compliance - requirements for signed updates, patch policy.
- Layer 7: Agent Ecosystem - registry trust and cross-platform update consistency.
Cross-References
- AST01 (Malicious Skills): Update drift can introduce malicious code through compromised updates.
- AST02 (Supply Chain Compromise): Unverified updates are a supply chain attack vector.
- AST04 (Insecure Metadata): Update metadata may be spoofed to hide malicious changes.
- AST08 (Poor Scanning): Updated skills may not be re-scanned, allowing new vulnerabilities.
- AST09 (No Governance): Lack of update policies enables uncontrolled drift.
References
- Snyk ToxicSkills
- Check Point Research: Caught in the Hook
- Oasis Security: ClawJacked (CVE-2026-28363)
- SecurityScorecard: 135,000+ OpenClaw instances exposed
Last updated: March 2026
Example
Put whatever you like here: news, screenshots, features, supporters, or remove this file and don’t use tabs at all.