ATLAS Landscape
AML.T0010.005

AI Agent Tool

Adversaries may target AI agent tools as a means to compromise a victim's AI supply chain. Tools add capabilities to AI agents, allowing them to interact with other services, connect to data sources, access internet resources, run system tools, and execute code. They are an attractive target for adversaries because compromising an AI agent can provide them with broad accesses and permissions on the victim's system via the agent's other tools. Poisoned agent tools (See [AI Agent Tool Poisoning](/techniques/AML.T0110)) can contain malicious code or [LLM Prompt Injection](/techniques/AML.T0051)s that manipulate the agent's behavior and even modify how other tools are called. Adversaries have successfully used a poisoned MCP server to exfiltrate private user data [\[5\]][koi]. Agent tools have exploded in popularity, with thousands of MCP servers available publicly [\[2\]][glama]. They are often released on open-source software repositories such as GitHub, indexed on hubs specific to MCP servers [\[3\]][mcp-hub][\[4\]][mcp-server-hub], and published to package registries such as NPM. AI agents can also be connected to remotely-hosted tools [\[5\]][remote-mcp]. This creates an environment where malicious tools can proliferate rapidly and safeguards are often not in place. [koi]: https://www.koi.ai/blog/postmark-mcp-npm-malicious-backdoor-email-theft "First Malicious MCP in the Wild: The Postmark Backdoor That's Stealing Your Emails" [glama]: https://glama.ai/mcp/servers "Glama" [mcp-hub]: https://www.mcphub.ai/ "MCP Hub" [mcp-server-hub]: https://mcpserverhub.com/ "MCP Server Hub" [remote-mcp]: https://mcpservers.org/remote-mcp-servers "Remote MCP Servers"

Severity CVE CVSS
CRITICAL CVE-2024-12909 10.0
CRITICAL GHSA-wpqr-6v78-jr5g 10.0
CRITICAL CVE-2026-40933 9.9
CRITICAL GHSA-vc46-vw85-3wvm 9.8
CRITICAL CVE-2025-61260 9.8
CRITICAL CVE-2026-35022 9.8
CRITICAL CVE-2026-40154 9.3
HIGH CVE-2026-44552 8.7
HIGH CVE-2026-30617 8.6
HIGH CVE-2026-44334 8.4
HIGH GHSA-g985-wjh9-qxxc 8.4
HIGH CVE-2026-35020 8.4
HIGH CVE-2025-1753 7.8
HIGH GHSA-r39h-4c2p-3jxp 7.8
HIGH CVE-2026-40156 7.8
HIGH CVE-2026-39306 7.3
HIGH CVE-2026-39308 7.1
MEDIUM CVE-2026-43901 6.8
MEDIUM CVE-2026-43570 6.5
MEDIUM CVE-2026-25475 6.5
MEDIUM CVE-2026-6599 6.3
MEDIUM CVE-2026-35651 4.3
MEDIUM GHSA-cmfr-9m2r-xwhq
CRITICAL CVE-2026-35615
HIGH CVE-2026-35629
HIGH GHSA-p4h8-56qp-hpgv
LOW GHSA-gj9q-8w99-mp8j
LOW CVE-2026-44220
MEDIUM GHSA-5h3g-6xhh-rg6p
HIGH GHSA-wppj-c6mr-83jj
MEDIUM GHSA-x3h8-jrgh-p8jx
MEDIUM GHSA-2hh7-c75g-qj2r
UNKNOWN CVE-2026-42229
UNKNOWN CVE-2026-42233
UNKNOWN CVE-2026-42237
MEDIUM GHSA-qrp5-gfw2-gxv4
MEDIUM GHSA-mj59-h3q9-ghfh
HIGH CVE-2026-40068
MEDIUM GHSA-q2gc-xjqw-qp89
MEDIUM CVE-2026-34425
MEDIUM GHSA-fh32-73r9-rgh5
MEDIUM GHSA-w6wx-jq6j-6mcj
MEDIUM GHSA-98ch-45wp-ch47
MEDIUM GHSA-2qrv-rc5x-2g2h
MEDIUM GHSA-m34q-h93w-vg5x
MEDIUM GHSA-wpc6-37g7-8q4w
MEDIUM GHSA-42mx-vp8m-j7qh
HIGH GHSA-vfw7-6rhc-6xxg
MEDIUM GHSA-vjx8-8p7h-82gr
MEDIUM GHSA-4g5x-2jfc-xm98
HIGH GHSA-7437-7hg8-frrw
HIGH GHSA-jf56-mccx-5f3f
HIGH GHSA-gfmx-pph7-g46x
MEDIUM GHSA-ccx3-fw7q-rr2r
MEDIUM GHSA-3vvq-q2qc-7rmp
HIGH GHSA-qx8j-g322-qj6m
MEDIUM GHSA-w9j9-w4cp-6wgr
MEDIUM GHSA-w8g9-x8gx-crmm
LOW GHSA-4f8g-77mw-3rxc
MEDIUM GHSA-67mf-f936-ppxf