特工技能 – 开放安全数据库
Agent Skills – Open Security Database

原始链接: https://index.tego.security/skills/

## 技能安全指数:摘要 技能安全指数是一项关键资源,用于评估与人工智能技能相关的安全风险——这些技能是日益流行的AI智能体的构建模块。由于智能体依赖于这些技能,它们的定义就成为了一个关键的漏洞点。 该指数分析来自GitHub等平台的技能,根据标准化的安全模式评估它们的指令和代码,重点关注*指令风险*——提示词可能如何导致安全防护措施失效或产生不安全行为。 技能根据在代码执行、网络访问和数据访问等类别中可能造成的潜在危害,被评级为“通过”至“严重”。该指数识别出诸如提示注入和过度权限等具体问题,并评估所请求的资源是否由技能的目的所合理。 最终,技能安全指数使开发者和安全工程师能够在部署*之前*了解技能的“爆炸半径”,从而促进更安全、更可靠的AI智能体开发。

## 新数据库分析AI代理技能安全风险 一个新的公共数据库,网址为[https://index.tego.security/skills/](https://index.tego.security/skills/),已启动以解决围绕AI代理技能(工具、函数或插件)日益增长的安全问题。这些技能正成为AI系统的核心,使其能够执行任务和自动化工作流程,但也引入了新的攻击面。 研究表明,现有技能中有很大一部分包含漏洞,例如提示注入和数据泄露风险。该数据库旨在通过结构化的安全分析使这些风险可见,结合自动化扫描、AI驱动的行为分析和人工审查。 分析重点在于技能在实际部署中*如何*被滥用,并考虑到其预期用途。它认识到代理能力引入了传统软件中未曾见过的新的攻击模式,例如间接提示注入。该数据库由处于隐形模式的公司Tego AI开发,面向公众开放,并将随着AI代理生态系统的发展而扩展。
相关文章

原文

About the Index

The Skills Security Index is a centralized repository providing security risk analysis for agentic AI skill definitions. As AI agents increasingly rely on modular skills to perform tasks, the instructions used to define these skills become a critical attack surface. This index helps security engineers and developers understand the potential "blast radius" of any given skill before deployment.

Inside the Lab

Each entry in the index represents a unique skill found across major platform registries in GitHub. We perform a deep scan of the skill's identity, its instructions, and associated code to build a comprehensive security profile.

Assessment Method

Analyses are performed against a standardized security schema and focuse on instructional risk. Such as identifying when a skill's prompts encourage an agent to bypass guardrails or perform sensitive operations without oversight.

Risk Ranking Framework

Risk is calculated dynamically across three dimensions. A skill is assigned the highest (most severe) level detected among:

  • Pass: No significant risks detected in instructions or tools.
  • Low: Minor capability risk with appropriate scoping context.
  • Medium: Potentially risky tool use or instructions that lack clear restrictions.
  • High: Direct instructions for sensitive operations (e.g., broad file system write or unencrypted network use).
  • Critical: Encouragement of malicious actions, data exfiltration, or explicit bypasses.

Capabilities

We classify instructions into several buckets: Tools, Code Execution, Web Access, File System, Data Access, Authentication, Network, and System. "Detected" means the skill explicitly encourages the agent to utilize these modalities.

Findings

Findings report specific deviations from security best practices, such as Prompt Injection vulnerabilities, Credential Exposure, or Excessive Permissions.

Permissions

Permissions are the underlying resource requests implied by the skill. We evaluate whether each request is justified by the skill's stated purpose.

联系我们 contact @ memedata.com