frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

Show HN: SkillFortify, a formal verification for AI agent skills

https://github.com/varun369/skillfortify
1•varunpratap369•1h ago
Hi HN,

In January 2026, 1,200 malicious skills infiltrated the OpenClaw agent marketplace (ClawHavoc campaign). A month later, researchers catalogued 6,487 malicious agent tools that VirusTotal cannot detect. The first agent-software RCE was assigned CVE-2026-25253.

The response: a dozen heuristic scanning tools (pattern matching, LLM-as-judge, YARA rules). They all carry the same caveat: "no findings does not mean no risk."

SkillFortify takes a different approach. Instead of checking for known bad patterns, it formally verifies what a skill CAN do against what it CLAIMS to do. Five mathematical theorems guarantee soundness -- if SkillFortify says a skill is safe, it provably cannot exceed its declared capabilities.

What it does: - skillfortify scan . -- discover and analyze all skills in a project - skillfortify verify skill.md -- formally verify against capability declaration - skillfortify lock -- generate skill-lock.json for reproducible configs - skillfortify trust skill.md -- compute trust score (provenance + behavior) - skillfortify sbom -- CycloneDX 1.6 Agent Skill Bill of Materials

Supports Claude Code skills, MCP servers, and OpenClaw manifests.

Evaluated on 540 skills (270 malicious, 270 benign): F1=96.95%, zero false positives.

Paper: [ZENODO_DOI_URL] Install: pip install skillfortify Code: https://github.com/varun369/skillfortify

Built as part of the AgentAssert research suite. Happy to answer questions about the formal model, threat landscape, or benchmark methodology.

Comments

varunpratap369•1h ago
Hi, I'm Varun — the author. A bit of context on why I built this.

  I've spent 15 years in enterprise technology as a Solution Architect. When
   our teams
  started adopting AI agents with third-party skills, I realized we had the
  same blind
  trust problem that npm had before npm audit existed — except worse,
  because agent
  skills can execute shell commands, read environment variables, and make
  network
  requests by design.

  After ClawHavoc hit in January, I saw a dozen scanning tools appear in
  weeks. All
  heuristic. All pattern matching. The leading one literally says in their
  docs: "no
  findings does not mean no risk." That bothered me.

  So I asked: can we do better than heuristics? The answer is yes — formal
  analysis
  with soundness guarantees. If the analysis says "no violations," the math
  proves
  the skill cannot exceed its declared capabilities. Not "we checked and
  didn't find
  anything" — "we proved it can't."

  The key insight: I adapted the Dolev-Yao model (1983, originally for
  cryptographic
  protocol verification) to model attackers in the agent skill supply chain.
   Combined
  with abstract interpretation over a capability lattice, SAT-based
  dependency
  resolution, and a trust algebra — you get five provable theorems instead
  of five
  regex patterns.

  Honest about limitations: we miss typosquatting (50% detection — needs
  name similarity
  module) and dependency confusion (0% — needs registry lookup). These are
  v0.2. The
  paper documents every gap.

  Happy to go deep on any of: the formal model, the benchmark methodology,
  why SAT
  for dependencies, or the trust score algebra. Ask away.
varunpratap369•1h ago
Hi, I'm author. A bit of context on why I built this.

  I've spent 15 years in enterprise technology as a Solution Architect. When
  our teams
  started adopting AI agents with third-party skills, I realized we had the
  same blind
  trust problem that npm had before npm audit existed — except worse, because
  agent
  skills can execute shell commands, read environment variables, and make
  network
  requests by design.

  After ClawHavoc hit in January, I saw a dozen scanning tools appear in
  weeks. All
  heuristic. All pattern matching. The leading one literally says in their
  docs: "no
  findings does not mean no risk." That bothered me.

  So I asked: can we do better than heuristics? The answer is yes — formal
  analysis
  with soundness guarantees. If the analysis says "no violations," the math
  proves
  the skill cannot exceed its declared capabilities. Not "we checked and
  didn't find
  anything" — "we proved it can't."

  The key insight: I adapted the Dolev-Yao model (1983, originally for
  cryptographic
  protocol verification) to model attackers in the agent skill supply chain.
  Combined
  with abstract interpretation over a capability lattice, SAT-based dependency

  resolution, and a trust algebra — you get five provable theorems instead of
  five
  regex patterns.

  Honest about limitations: we miss typosquatting (50% detection — needs name
  similarity
  module) and dependency confusion (0% — needs registry lookup). These are
  v0.2. The
  paper documents every gap.

  Happy to go deep on any of: the formal model, the benchmark methodology, why
   SAT
  for dependencies, or the trust score algebra. Ask away.

Show HN: Turning 2D floor plans into 3D-ready JSON with Detectron2

https://www.loom.com/share/b741bc127c814db395832b01bd086e96
1•acaciabengo•57s ago•0 comments

Explain to Issue Reporter

https://github.com/fsprojects/fantomas/issues/1704
1•debugnik•1m ago•0 comments

Brave Search API now features Place Search, a new endpoint for map applications

https://brave.com/blog/place-search-api/
1•w0ts0n•1m ago•0 comments

Launch HN: Cardboard (YC W26) – Agentic video editor

https://www.usecardboard.com/
1•sxmawl•2m ago•0 comments

We Built a Video Rendering Engine by Lying to the Browser About What Time It Is

https://blog.replit.com/browsers-dont-want-to-be-cameras
1•cbrewster•2m ago•0 comments

OsmAnd's Faster Offline Navigation

https://osmand.net/blog/fast-routing/
1•todsacerdoti•2m ago•0 comments

AirSnitch: Demystifying and Breaking Client Isolation in Wi-Fi Networks

https://www.ndss-symposium.org/ndss-paper/airsnitch-demystifying-and-breaking-client-isolation-in...
1•todsacerdoti•3m ago•0 comments

People Leaving US

https://trendslates.substack.com/p/teen-ai-usage-amazon-alleged-price
1•faderisimo•5m ago•0 comments

My accepted research work on 'Failure-Aware Security Framework'

https://papers.ssrn.com/sol3/papers.cfm?abstract_id=6122687
1•sandhyavinjam•6m ago•0 comments

Bring Your Own Agent (BYOA)

https://blog.val.town/byoa
1•stevekrouse•6m ago•0 comments

Attacking Russia's Center of Gravity: A Clausewitzian Answer

https://www.militarystrategymagazine.com/article/attacking-russias-center-of-gravity-a-clausewitz...
1•bryanrasmussen•8m ago•0 comments

Human Made: The Pledge

https://lee-phillips.org/humanmade/
1•leephillips•9m ago•0 comments

GitHub Actions is left vulnerable to supply chain attacks: Datadog Report

https://www.datadoghq.com/state-of-devsecops/
2•varunsharma07•10m ago•0 comments

How Google Killed the Rent-a-Domain Era

https://growtika.com/blog/publisher-affiliate-collapse
1•Growtika•10m ago•0 comments

Show HN: Karta – Google Search, for discovering talent

https://www.karta.works
1•kidustiliksew•10m ago•0 comments

Smallest transformer that can add two 10-digit numbers

https://github.com/anadim/AdderBoard
1•ks2048•10m ago•0 comments

A Visual Guide to DNA Sequencing

https://www.asimov.press/p/dna-sequencing
1•mailyk•11m ago•0 comments

He saw an abandoned trailer. Then, uncovered a surveillance network

https://calmatters.org/justice/2026/02/alpr-border-patrol-caltrans/
10•Element_•13m ago•2 comments

Show HN: I built a local AI-powered Ouija board with a fine-tuned 3B model

https://github.com/SurceBeats/Planchette
3•SurceBeats•14m ago•1 comments

Using AI without losing skills

https://manafov.co/posts/using-ai-without-losing-skills
2•airbridgeflyer•15m ago•0 comments

Hyper: a reactive server side rendered web framework for Clojure

https://github.com/dynamic-alpha/hyper
2•rschmukler•16m ago•1 comments

Trump, seeking executive power over elections, is urged to declare emergency

https://www.washingtonpost.com/politics/2026/02/26/trump-elections-executive-order-activists/
3•martialg•16m ago•0 comments

TikTok, X link organiser for iOS and Android

https://saveforlater.pro
2•aria-sfl•18m ago•0 comments

Towards a Sovereign Mobile Stack

https://modal.cx/blog/sovereign-mobile-stack/
3•tomwas54•19m ago•0 comments

Show HN: Protection Against Zero-Day Cyber Attacks

2•gaurav1086•19m ago•0 comments

Anthropic is giving Claude Opus 3 its own Substack

https://substack.com/home/post/p-189177740
3•luispa•19m ago•1 comments

4Chan knew about Jeffrey Epstein's death 38 minutes before the rest of the world

https://www.businessinsider.com/epstein-files-show-fbi-probed-4chan-posts-prison-death-2026-2
5•cwwc•20m ago•0 comments

Ask HN: How are you handling EU AI Act compliance as a developer?

1•gibs-dev•20m ago•0 comments

Microsoft announces new "mini PCs" for Windows 365

https://www.neowin.net/news/microsoft-announces-new-mini-pcs-for-windows-365/
3•mikece•21m ago•0 comments

Stellify – Structured code for AI-assisted development

https://stellisoft.com
2•Stellisoft•21m ago•1 comments