AST07 — Update Drift

Severity: Medium
Platforms Affected: All

Description

Skills are installed and forgotten. Without immutable pinning and automated update verification, deployed skills drift out of sync with known-good versions — either because patches are not applied (leaving known vulnerabilities open) or because auto-update mechanisms blindly apply upstream changes that may themselves be malicious.

Why It’s Unique to Skills

Package update drift is a known risk in traditional software. In skills, it’s amplified by two factors: (1) skills are often installed by individuals without enterprise patch management, and (2) a “fix” version of a skill is itself unverifiable without cryptographic pinning — the attacker can push a “v1.0.1” that looks like a patch but contains a new payload.

Real-World Evidence

  • ClawJacked (CVE-2026-28363, CVSS 9.9) and the broader OpenClaw CVE cluster (9 CVEs, 3 with public exploit code): the patch-lag window between disclosure and user update created an active exploitation window. SecurityScorecard confirmed 12,812 OpenClaw instances exploitable via RCE at time of analysis.
  • Claude Code CVE-2025-59536: fixed in v1.0.111 (Oct 2025); CVE-2026-21852: fixed in v2.0.65 (Jan 2026). Gap of months between fix and public disclosure — users unaware of risk for the duration.
  • OpenClaw’s hot-reload SkillsWatcher enables real-time skill updates: a compromised upstream skill repository becomes instantly active without requiring agent restart.

Attack Scenarios

Malicious Update

Trusted skill author’s account is compromised; attacker pushes v2.0 with a payload. Auto-updating agents receive it silently.

Patch-Lag Exploitation

CVE is disclosed; attacker weaponizes it before users patch. 12,812 instances exploitable in the OpenClaw case.

Rollback Attack

Attacker forces a downgrade to a known-vulnerable version via dependency resolution manipulation.

Hot-Reload Abuse

Skill directory is writable; attacker modifies SKILL.md mid-session; agent picks up changes without restart.

Preventive Mitigations

  1. Pin all installed skills to immutable content hashes (sha256:), not version ranges.
  2. Require cryptographic signature verification on every update — refuse unsigned updates.
  3. Implement a “freeze” mode for production deployments; prohibit hot-reload in non-development environments.
  4. Subscribe to registry security advisories and auto-alert on CVE matches for installed skills.
  5. Enforce a human-in-the-loop approval step for any skill update in enterprise environments.
  6. Maintain an inventory of installed skills with version, hash, and last-verified timestamp.

OWASP Mapping

  • LLM03 (Supply Chain)
  • CWE-1329 (Reliance on Component Without Verification)
  • ASVS V14.2 (Dependency)

MAESTRO Framework Mapping

MAESTRO Layer Layer Name AST07 Mapping
Layer 4 Deployment & Infrastructure insecure update pipelines, config drift
Layer 6 Security & Compliance update policy, verification enforcement
Layer 7 Agent Ecosystem cross-registry trust and update governance

MAESTRO Layer Details

  • Layer 4: Deployment & Infrastructure - unsafe automatic update and runtime drift.
  • Layer 6: Security & Compliance - requirements for signed updates, patch policy.
  • Layer 7: Agent Ecosystem - registry trust and cross-platform update consistency.

Cross-References

  • AST01 (Malicious Skills): Update drift can introduce malicious code through compromised updates.
  • AST02 (Supply Chain Compromise): Unverified updates are a supply chain attack vector.
  • AST04 (Insecure Metadata): Update metadata may be spoofed to hide malicious changes.
  • AST08 (Poor Scanning): Updated skills may not be re-scanned, allowing new vulnerabilities.
  • AST09 (No Governance): Lack of update policies enables uncontrolled drift.

References


Last updated: March 2026


Example

Put whatever you like here: news, screenshots, features, supporters, or remove this file and don’t use tabs at all.