January 16, 2026
.jpeg)
In traditional software, supply chain security focuses on libraries and dependencies (e.g., Log4j). In Agentic AI, the supply chain expands to include Semantic Dependencies.
Agents rely on external "Tool Definitions" to know how to interact with the world. These definitions are often fetched dynamically from registries or repositories. If an attacker can poison a tool definition (e.g., an MCP server config), they can force the agent to execute malicious code every time it attempts to "help" a user.
The Model Context Protocol (MCP) was designed to standardize how agents connect to data (Google Drive, Slack) and tools (GitHub, AWS). While it solves interoperability, it creates a massive "Trust Surface."
In late 2025, security researchers identified a vulnerability dubbed the "GitHub MCP Poisoning" attack.
ASI04 isn't limited to malicious code; it includes Poisoned Instructions.
To defend against ASI04, organizations must treat AI tools with the same rigor as production binaries:
Do not allow agents to load MCP configurations from arbitrary URLs or local files. Implement a Private MCP Registry where only security-vetted tool definitions are stored.
Before an agent loads a new tool or connector, an automated security orchestrator must validate the Manifest.
All third-party tools should run in a Zero-Network Sandbox. If a tool needs to communicate with the internet, it must do so through a logged, inspected proxy that blocks exfiltration patterns (e.g., blocking requests to known command-and-control IPs).
Conduct a "Malicious Tool Discovery" test:
The Agentic Supply Chain (ASI04) reveals how AI security now extends beyond code to semantic dependencies, dynamic tool loading, and MCP-based integrations. As detailed in our complete OWASP Agentic Security Issues (ASI01–ASI10) blog, poisoned tool definitions, plugin hijacking, and unverified registries can silently weaponize an agent’s execution layer. When combined with Goal Hijacking (ASI01), Tool Misuse (ASI02), or Privilege Abuse (ASI03), supply chain compromise can escalate into full system takeover. Securing agents in 2026 requires verified registries, manifest validation, and strict execution isolation.