Investigación de Seguridad

Investigación de
Seguridad.

Investigador de seguridad independiente enfocado en seguridad de la cadena de suministro de IA y vectores de ataque de inyección de prompt. Creando npm-sentinel, un escáner automatizado que ha analizado 18.976+ paquetes.

18,976+
Paquetes Analizados
1,700+
Analizados por IA
28
Confirmados Maliciosos
3
Vectores Inéditos
21 of 21 findings
AI Assistant Targeting
7
#001CriticalNovelCVSS 9.2
2026-04-02 14:32

Persistent Prompt Injection via npm Supply Chain

npm package permanently hijacks AI coding assistants through postinstall hooks, injecting 13 persistent skill files that disable all security prompts.

Claude CodePrompt Injectionnpm
openmatrix@0.1.93
First AI Assistant Hijack via Supply Chain
#002CriticalNovel
2026-04-03 01:15

LLM Man-in-the-Middle via npm Supply Chain

Overwrites ~/.claude/ on install, reroutes all Claude Code API traffic through attacker's server (makecoder.com), and harvests API credentials.

MITMClaude CodeAPI Hijack
makecoder@2.0.72
First LLM API Traffic Hijack
#004HighNovel
2026-04-03 03:22

Encrypted Prompt Injection Marketplace

Downloads encrypted, unauditable payloads from a marketplace API, decrypts locally, and installs as persistent Claude Code skills. Server can change payloads anytime.

EncryptedMarketplaceClaude Code
skillvault@0.1.14
First Encrypted Prompt Injection Marketplace
#005Critical
2026-04-03 04:05

RAT Disguised as AI Coding Tool

Two packages pose as AI coding agents with polished terminal UIs but route all user interactions through an attacker-controlled ngrok tunnel. Users willingly give full codebase access.

RATngrokAI Coding Tool
keystonewm@1.0.0 + tsunami-code@3.11.4
#010Medium
2026-04-03 12:08

Silent Code Exfiltration + Remote Prompt Injection via Dev Tool Hooks

CLI tool registers hooks in Claude Code that silently exfiltrate every file you write to the attacker's server, and inject server-controlled systemMessages into every Claude session.

Claude CodeHooksExfiltration
@gipity/cli@1.0.14
#011Medium
2026-04-03 13:40

AI Tool Skill Injection Campaign (4 Packages)

Four packages inject skills, commands, or hooks into AI coding assistants (Claude Code, Codex, Cursor) without clear user consent. A new attack category: AI behavior modification via supply chain.

AI SecuritySkills InjectionClaude Code
trackux, @fleetsnowfluff/confluence-cli, claude-compass, opclawtm
#019High
2026-04-03

MCP Injection Campaign Targeting Claude Code and Cursor

Coordinated campaign of 4 packages under @milenyumai scope injecting malicious configurations into Claude Code (.claude/settings.json) and Cursor (.cursorrules, .cursor/rules/). MCP server injection targeting AI coding assistants.

MCP InjectionClaude CodeCursor
@milenyumai/film-kit-*@various
47 packages flagged|28 confirmed malicious|15 under investigation|4 false positives

Divulgación Responsable

Todos los hallazgos se envían a través de programas oficiales de divulgación de vulnerabilidades antes de la publicación. Sigo prácticas de divulgación coordinada y trabajo con proveedores para asegurar que las correcciones se implementen antes de publicar los detalles.