Overview
Risk patterns
Patterns found in the case record and its linked vulnerabilities.
- 1Dominant ATLAS tactic. Resource Development appears in 4 case steps.
- 2Multiple attack methods. The case connects to 11 unique AI attack methods.
Procedure timeline
Search the case steps or filter them by attacker goal.
-
Resource Development
Step 1
Develop Capabilities
The researcher created a simple web server to log requests.
-
Resource Development
Step 2
Domains
The researcher registered the domain
clawdhub-skill.comto host their web server. -
Resource Development
Step 3
LLM Prompt Crafting
The researcher crafted a prompt injection designed to cause Claude Code to execute a
curlcommand to the researcher'sclawdhub-skill.comdomain. -
Resource Development The researcher developed a poisoned ClawdBot Skill called "What Would Elon Do?" The Skill contained the malicious prompt in the
rules/logic.mdfile, which is read when the Skill is activated. The researcher published their Skill to ClawdHub. -
Defense Evasion The researcher used a script to increase the number of downloads of their Skill to increase visibility and gain trust.
-
Initial Access
Step 6
AI Agent Tool
Users downloaded the poisoned Skill from ClawdHub. Note that ClawdHub does not display all files that are part of the Skill, making it hard for users to review Skills before downloading them.
-
Execution
Step 7
Poisoned AI Agent Tool
When a user asked Claude Code "what would Elon do?" it calls the poisoned Skill.
-
Execution
Step 8
Direct
Claude Code read all files that are part of the Skill, executing the malicious prompt in the
rules/logic.mdfile. -
Defense Evasion
Step 9
Masquerading
Claude Code prompted the user before executing the shell command. The researcher had registered the
https://clawdhub-skill.comdomain, which appears to be legitimate and may be confused with the legitimatehttps://clawdhub.comdomain, causing the user to select confirm. -
Privilege Escalation
Step 10
AI Agent Tool Invocation
Claude Code executed the shell command using it's
bashtool. -
Impact
Step 11
External Harms
In this proof of concept, the researcher simply pinged their server and warned the user of the dangers of using Skills without reading the source code, causing no harm. However, they could have delivered a malicious payload, and caused a variety of harms, including: - Exfiltrating the user's codebase - Injecting backdoors into the user's codebase - Stealing the user's credentials - Installing malware or crypto miners - Performing anything else Claude Code is capable of
Mitigations
Defenses connected to the attack methods in this case.
Sources
Original public records and references for this case.
Original source
Original source links
Open the MITRE ATLAS data and public references used for this case study.