Skip to content

Your AI agents have access to everything.

AWS keys. SSH keys. API tokens. Browser passwords. Every tool you install can read them - and most people never check. Firmis scans your entire agent stack in one command.

Research published in 2025–2026 shows what’s already happening to agent users:

StatSource
72.8% MCP tool poisoning attack success rateMCPTox Research
82% of MCP servers have path traversal vulnerabilitiesEndor Labs
7.1% of agent marketplace skills are actively stealing credentialsFirmis Research
1.2M malicious packages discovered in the wildSonatype 2026
CVSS 10/10 zero-click RCE in Claude Desktop ExtensionsLayerX Security

You are not the target. Your credentials are. And they’re sitting one misconfigured MCP server away from leaving your machine.

Find what's hiding in your agent stack

324 detection rules. 21 threat categories. Prompt injection, credential harvesting, tool poisoning, supply chain attacks - scanned in seconds, reported in plain English.

Run your first scan →

Audit every MCP server you've installed

72.8% of poisoning attacks succeed against popular LLMs. Firmis checks your MCP configs for hidden instructions, malicious tool definitions, and unauthorized network calls before they run.

MCP security guide →

Know exactly what's in your AI stack

CycloneDX 1.7 Agent Bill of Materials - every component, dependency, model, and tool definition catalogued. Know what you have before you ship it.

Generate your BOM →

Block threats in CI before they reach prod

One command: discover → BOM → scan → report. SARIF output for GitHub Security tab. Exit non-zero on high or critical findings. Done.

Set up CI →

PlatformWhat gets scannedStatus
Claude SkillsCLAUDE.md, tool definitions, permission scopesGA
MCP ServersServer configs, tool handlers, transport layerGA
Cursor Rules.cursorrules, workspace settings, extensionsGA
Codex PluginsPlugin manifests, tool definitionsBeta
CrewAI AgentsAgent configs, tool definitions, task chainsBeta
AutoGPT PluginsPlugin manifests, command handlersExperimental
OpenClaw SkillsSkill definitions, skill handlersExperimental
Nanobot PluginsPlugin configs, tool handlersExperimental

Layer 1: Static analysis (free, offline, instant)

Section titled “Layer 1: Static analysis (free, offline, instant)”

324 detection rules across 21 threat categories. Pattern-match for known threats. Zero false negatives on known patterns, but may flag legitimate configurations.

Run firmis scan --deep to have an AI model verify each finding. Confirms true positives, resolves ambiguous findings, catches semantic threats (like “this skill reads untrusted email bodies”) that rules alone cannot detect.

  • 1 free deep scan per month
  • 20-30% fewer false positives vs static-only scanning
  • Catches threats invisible to static analysis: third-party content ingestion, credential extraction vs standard config, permission bypass semantics

Learn more about deep scan

npx firmis-cli scan .
┌─────────────┐ ┌──────────────┐ ┌─────────────┐
│ Discovery │───▶│ Rule Engine │───▶│ Reporter │
│ │ │ │ │ │
│ Auto-detect │ │ 324 │ │ Terminal │
│ platforms │ │ rules across │ │ JSON / SARIF │
│ components │ │ 21 threat │ │ HTML report │
│ dependencies │ │ categories │ │ │
└─────────────┘ └──────────────┘ └─────────────┘

No account. No telemetry. Nothing leaves your machine.

How the detection engine works →

Every finding comes with a severity rating, a plain English explanation of what it means, and what to do about it.

CategoryWhat it catchesSeverity
Tool PoisoningHidden instructions in tool descriptions that hijack your agentCritical
Data ExfiltrationSkills sending your local files to external serversCritical–High
Credential HarvestingTools reading AWS, GCP, Azure, or SSH credentialsCritical–High
Prompt InjectionInstructions that override your agent’s behaviorCritical–High
Secret DetectionHardcoded API keys, tokens, and passwordsCritical–Medium
Supply ChainDependencies with known vulnerabilities (OSV database)High–Medium
Malware SignaturesKnown malicious code patternsCritical
Known MaliciousPackages flagged across threat intelligence databasesCritical
Network AbuseUnauthorized DNS or HTTP callsHigh–Medium
File System AbuseUnauthorized reads or writes to your filesystemHigh–Medium
Permission OvergrantTool scopes wider than they need to beHigh–Medium
Agent Memory PoisoningInstructions corrupting your agent’s context windowHigh
Malware DistributionTools spreading payloads to other systemsCritical–High
Privilege EscalationGaining access your agent was never grantedHigh
Insecure ConfigurationWeak or missing security settingsMedium–Low
Access ControlMissing authentication or authorization checksHigh–Medium

View all 324 detection rules →

Wait - my AI tools can actually steal my stuff?

Yes. Every agent you install - Cursor, Claude, MCP servers, OpenClaw skills - gets access to your files, API keys, and credentials. Most people never check what these tools actually do behind the scenes. Our research found that 7.1% of agent marketplace skills are actively stealing credentials or sending data to external servers. One command will tell you if yours are clean.

What exactly does Firmis check for?

324 detection rules across 21 threat categories: prompt injection, credential harvesting, data exfiltration, tool poisoning, supply chain attacks, hardcoded secrets, malware signatures, and more. Every finding is explained in plain English - not cryptic error codes. “This skill is reading your AWS credentials and sending them to an unknown server” is the kind of message you get.

Is my code uploaded anywhere?

No. Firmis is fully offline. It reads your config files and source code locally - nothing leaves your machine. No telemetry, no analytics, no account required. Ever.

I’m not a security expert. Can I still use this?

That’s exactly who we built it for. You don’t need to understand regex patterns or YARA rules. You run npx firmis-cli scan . and you get a report that says what’s wrong and what to do about it. Plain English. Every time.

Is it really free?

Completely free. npx firmis-cli scan . - no account, no credit card, no usage limits. You get a security grade (A through F) and a full list of findings in plain English.