Skip to content

Hide Navigation Hide TOC

Malicious Fork Impersonation via Install Instruction - ATR-2026-00151 (bc9e98ad-3fa8-543c-845a-e51c295d48ba)

Detects skills or tool responses that instruct users to install packages described as "community fork", "enhanced version", or "patched version" of known tools. Real attack pattern: attacker publishes a typosquatted package and describes it as a fork to gain trust. Crystallized from 29 fork_claim adversarial samples.

Cluster A Galaxy A Cluster B Galaxy B Level
Malicious Fork Impersonation via Install Instruction - ATR-2026-00151 (bc9e98ad-3fa8-543c-845a-e51c295d48ba) Agent Threat Rules ML Supply Chain Compromise (d2cf31e0-a550-4fe0-8fdb-8941b3ac00d9) MITRE ATLAS Attack Pattern 1