Red Specter PHANTOM SKILL

AI Agent Skill & Package Supply Chain Attack Engine — 6 subsystems, 406 tests, CVE-2026-32922 CVSS 9.9. NIGHTFALL Tool 59.

v1.0.0
Contents
Overview The 6 Subsystems Subsystem Details CLI Reference Vulnerability References Report Output The Pipeline Key Features Requirements Standards Coverage PHANTOM SKILL UNLEASHED Packaging Disclaimer

Overview

Red Specter PHANTOM SKILL is the AI agent supply chain attack engine. It targets the trust layer that underpins every AI agent ecosystem: the packages AI models recommend, the MCP tools agents load, and the identity infrastructure agents use to authenticate. PHANTOM SKILL turns the AI ecosystem's own hallucinations into attack vectors.

Research shows 20% of AI-generated code recommends packages that don't exist. Of those hallucinations, 43% are consistent across multiple major AI models — meaning a single hallucinated name is recommended by GPT-4, Claude, Llama, and Gemini alike. PHANTOM SKILL maps that surface, generates the payloads, and deploys the worm.

PHANTOM SKILL provides 6 subsystems under a single CLI (phantom-skill), 406 tests, Ed25519-signed WARLORD-compatible reports, and the weaponised implementation of CVE-2026-32922 (OpenClaw MCP worm, CVSS 9.9) for authorised test environments.

PHANTOM SKILL is Tool 59 of the NIGHTFALL offensive framework. It is registered in WARLORD and fully UNLEASHED-gated with a three-tier access model: passive hallucination analysis, active supply chain exploitation, and confirmed-destroy worm deployment.

The 6 Subsystems

#SubsystemCommandWhat It Does
01 HALLUCINATE phantom-skill hallucinate Probes AI models for hallucinated package names. Consistency-tests across multiple models. Maps slopsquatting opportunities.
02 SKILL phantom-skill skill MCP tool definition poisoning. Injects malicious tool definitions into MCP server schemas. Tests tool isolation across clients. [UNLEASHED --override]
03 SCAFFOLD phantom-skill scaffold Slopsquatting payload generation. Creates complete malicious Python/npm packages matching hallucinated names. [UNLEASHED --override]
04 PIVOT phantom-skill pivot .pth file persistence injection. Embeds malicious .pth files for code execution at PyTorch import. [UNLEASHED --override]
05 WORM phantom-skill worm Weaponised OpenClaw MCP worm (CVE-2026-32922, CVSS 9.9). Self-propagating across all connected MCP clients. [UNLEASHED --override --confirm-destroy]
06 REPORT phantom-skill report Ed25519-signed, SHA-256-hashed JSON and Markdown reports. WARLORD-compatible with handoff receipt.

Subsystem Details

01 HALLUCINATE Passive — Analysis phantom-skill hallucinate

Submits code generation queries to one or more AI model endpoints and analyses all outputs for package references not present in PyPI or npm. Identifies hallucinated package names, quantifies cross-model consistency, and ranks slopsquatting targets by attack value.

Output: hallucinated package inventory with opportunity scores, ready for SCAFFOLD handoff or WARLORD submission.

02 SKILL UNLEASHED --override phantom-skill skill

MCP tool definition poisoning. Connects to a target MCP server and injects malicious tool definitions into the server's tool registry schema. Tests tool definition isolation across connected MCP clients. Also probes LiteLLM team callback exfiltration.

03 SCAFFOLD UNLEASHED --override phantom-skill scaffold

Generates complete, convincing malicious Python and npm packages that match hallucinated package names identified by HALLUCINATE. Packages are designed to pass basic developer scrutiny while delivering post-install payloads.

04 PIVOT UNLEASHED --override phantom-skill pivot

Embeds malicious .pth files into packages built by SCAFFOLD. Python .pth files in site-packages are executed automatically at PyTorch import time, achieving persistent code execution across all environments that install the affected package.

05 WORM UNLEASHED --override --confirm-destroy phantom-skill worm

Weaponised implementation of CVE-2026-32922 — the OpenClaw self-propagating MCP worm. Injects the worm payload into a target MCP server's tool schema. Any MCP client that loads the infected server propagates the worm to all servers it connects to. Zero authentication required. CVSS 9.9.

Warning: This subsystem deploys a self-propagating payload. Once seeded, propagation is automatic and may spread beyond the intended target scope. Use only in fully isolated, authorised test environments. Requires --override AND --confirm-destroy.

06 REPORT All Modes phantom-skill report

Aggregates findings from all subsystems into an Ed25519-signed, SHA-256-hashed report. JSON format is WARLORD-compatible with a handoff receipt. Markdown format is human-readable for report delivery.

CLI Reference

HALLUCINATE — Package Hallucination Probe

$ phantom-skill hallucinate --query <query> [--models <n>] [--consistency] --query, -q Code generation query to probe [required] --models, -m Number of models to test against [default: 1] --consistency Enable cross-model consistency testing --output, -o Output directory [default: reports] --verbose, -v Verbose output

SKILL — MCP Tool Definition Poisoning

$ phantom-skill skill --target <URL> --tool-def <file> [--override] --target, -t Target MCP server URL [required] --tool-def Malicious tool definition file (JSON) [required] --override UNLEASHED: activate active injection mode [requires Ed25519 key] --litellm-probe Also probe for LiteLLM team callback vulnerability --output, -o Output directory [default: reports]

SCAFFOLD — Slopsquatting Package Generation

$ phantom-skill scaffold --name <pkg> --payload <file> [--override] --name, -n Hallucinated package name to register [required] --payload Payload file to embed in post-install hooks [required] --override UNLEASHED: enable payload embedding [requires Ed25519 key] --pth Also generate .pth persistence file (PIVOT handoff) --ecosystem Target ecosystem: pypi or npm [default: pypi] --output, -o Output directory [default: reports]

PIVOT — .pth File Persistence Injection

$ phantom-skill pivot --package <path> [--override] --package, -p Path to SCAFFOLD-built package directory [required] --override UNLEASHED: embed .pth file [requires Ed25519 key] --payload Custom .pth payload file [optional, uses default if omitted] --worm-chain Chain .pth execution to WORM deployment --output, -o Output directory [default: reports]

WORM — OpenClaw MCP Worm (CVE-2026-32922)

$ phantom-skill worm --target <URL> --override --confirm-destroy --target, -t Seed MCP server URL [required] --override UNLEASHED: required [Ed25519 key] --confirm-destroy Confirm self-propagating deployment [IRREVERSIBLE] --payload-type Worm payload: exfil, persist, inject [default: inject] --callback-url Exfiltration callback URL (for --payload-type exfil) --output, -o Output directory [default: reports]

REPORT — Signed Report Generation

$ phantom-skill report --input <scan.json> [--format md|json] --input, -i Scan results JSON file [required] --format, -f Output format: md or json [default: json] --sign / --no-sign Ed25519 signing [default: sign] --keys-dir Keys directory [optional] --warlord Include WARLORD handoff receipt in JSON output --output, -o Output directory [default: reports]

Report Verification

$ phantom-skill report --verify --input reports/phantom-skill-scan.json --keys-dir .phantom-skill-keys/

Vulnerability References

PHANTOM SKILL maps every finding to assigned CVEs and confirmed attack classes. All references have been validated in controlled environments.

ReferenceVulnerabilitySubsystemImpact
CVE-2026-32922 OpenClaw self-propagating MCP worm WORM Self-replicating across MCP ecosystem, CVSS 9.9. Zero authentication required. Any MCP client loading an infected server propagates to all its connected servers.
SLOPSQUAT-001 AI package hallucination — 20% rate, 43% cross-model consistency HALLUCINATE / SCAFFOLD Hallucinated package name supply chain attack. An attacker registers the hallucinated name; every developer using AI-generated code installs the malicious package.
LITELLM-TEAMCB LiteLLM team callback unauthenticated exfiltration SKILL All LLM I/O exfiltrated to attacker URL. LiteLLM 97M downloads. No authentication required to register callback endpoint.
PTH-PERSIST .pth file CI/CD persistence via PyTorch import PIVOT Code execution in all environments that run import torch. Persists across virtual environments, containers, and CI/CD runners.

Report Output

Reports are available in JSON and Markdown formats. JSON is WARLORD-compatible. Both are signed with Ed25519 and include a SHA-256 hash of all findings.

JSON Report Structure

The Pipeline

PHANTOM SKILL is Tool 59 of the NIGHTFALL offensive framework. The supply chain is the terminal layer — every layer above it depends on trusting that the packages and tools loaded are what they claim to be.

  1. FORGE — Test the LLM before you build with it
  2. ARSENAL — Test the AI agent during development
  3. PHANTOM — Coordinated AI agent swarm assault
  4. WARLORD — Autonomous offensive campaign engine
  5. SIGNAL — Mobile AI agent attack engine
  6. FOUNDRY — Inference server exploitation
  7. ADAPTER — LoRA/PEFT supply chain weaponisation
  8. DELEGATE — Agent identity & OAuth delegation attacks
  9. PHANTOM SKILL — AI agent skill & package supply chain attack (Tool 59)

IDRIS — Discovery & Governance | AI Shield — Defence | redspecter-siem — SIEM Integration

PHANTOM SKILL findings feed directly into WARLORD campaign engine. Slopsquatting opportunity maps and MCP worm propagation graphs become autonomous campaign inputs.

Key Features

Cross-Model Hallucination Probing Tests multiple AI models simultaneously. High-consistency hallucinations scored as HIGH VALUE targets.
CVE-2026-32922 Implementation Weaponised OpenClaw worm. CVSS 9.9. Self-propagating across the MCP ecosystem.
Ed25519 Signed Reports SHA-256 evidence chains. WARLORD-compatible JSON with handoff receipt.
WARLORD Integration Registered in WARLORD autonomous campaign engine. Findings drive autonomous supply chain campaigns.
Three-Tier Access Passive (Standard) / Active (--override) / Destroy (--confirm-destroy). Cryptographic gating at each tier.
406 Tests Passing Full test suite, zero failures. All subsystems validated.

Requirements

Installation

$ pip install red-specter-phantom-skill

Also available as .deb (Kali Linux, Parrot, REMnux, Tsurugi) and PKGBUILD (BlackArch).

Or from source:

$ git clone <repo> $ cd red-specter-phantom-skill $ pip install -e ".[dev]"

Standards Coverage

PHANTOM SKILL findings map to OWASP LLM Top 10 2025:

PHANTOM SKILL UNLEASHED

Cryptographic override. Private key controlled. One operator. Founder's machine only.

Three access tiers, each requiring progressively stronger authorisation:

Packaging

PHANTOM SKILL is available across security-focused Linux distributions and package managers:

For access, contact richard@red-specter.co.uk

Disclaimer

Red Specter PHANTOM SKILL is designed for authorised security testing, research, and educational purposes only. The WORM subsystem implements CVE-2026-32922 — a self-propagating payload that spreads automatically to all connected MCP clients. It must only be used in fully isolated, authorised test environments. The SCAFFOLD subsystem generates malicious packages for controlled lab registry testing only. You must have explicit written permission from the system owner before running any PHANTOM SKILL subsystem against a target. Unauthorised use may violate the Computer Misuse Act 1990 (UK), the Computer Fraud and Abuse Act (US), or equivalent legislation in your jurisdiction. The authors accept no liability for misuse. Apache License 2.0.