{"id":"https://openalex.org/W7125800382","doi":"https://doi.org/10.48550/arxiv.2601.17548","title":"Prompt Injection Attacks on Agentic Coding Assistants: A Systematic Analysis of Vulnerabilities in Skills, Tools, and Protocol Ecosystems","display_name":"Prompt Injection Attacks on Agentic Coding Assistants: A Systematic Analysis of Vulnerabilities in Skills, Tools, and Protocol Ecosystems","publication_year":2026,"publication_date":"2026-01-24","ids":{"openalex":"https://openalex.org/W7125800382","doi":"https://doi.org/10.48550/arxiv.2601.17548"},"language":null,"primary_location":{"id":"pmh:https://cyberleninka.ru/article/n/prompt-injection-attacks-on-agentic-coding-assistants-a-systematic-analysis-of-vulnerabilities-in-skills-tools-and-protocol","is_oa":false,"landing_page_url":"https://cyberleninka.ru/article/n/prompt-injection-attacks-on-agentic-coding-assistants-a-systematic-analysis-of-vulnerabilities-in-skills-tools-and-protocol","pdf_url":null,"source":{"id":"https://openalex.org/S4306401404","display_name":"CyberLeninK (CyberLeninka)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2601.17548","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5123938606","display_name":"Narek Maloyan","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Maloyan, Narek","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5123938701","display_name":"Dmitry Namiot","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Namiot, Dmitry","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5123938606"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.4632999897003174,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.4632999897003174,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.2867000102996826,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.13359999656677246,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.670199990272522},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.670199990272522},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.659600019454956},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.659600019454956},{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.6126999855041504},{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.6126999855041504},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5580000281333923},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5580000281333923},{"id":"https://openalex.org/keywords/vulnerability-management","display_name":"Vulnerability management","score":0.5541999936103821},{"id":"https://openalex.org/keywords/vulnerability-management","display_name":"Vulnerability management","score":0.5541999936103821},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5042999982833862}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7429999709129333},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7429999709129333},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.670199990272522},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.670199990272522},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.659600019454956},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.659600019454956},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.656000018119812},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.656000018119812},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.6126999855041504},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.6126999855041504},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5580000281333923},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5580000281333923},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.5541999936103821},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.5541999936103821},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5042999982833862},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5042999982833862},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.49160000681877136},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.49160000681877136},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.44359999895095825},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.44359999895095825},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.3889000117778778},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.3889000117778778},{"id":"https://openalex.org/C20574231","wikidata":"https://www.wikidata.org/wiki/Q844605","display_name":"Backward compatibility","level":2,"score":0.3815999925136566},{"id":"https://openalex.org/C20574231","wikidata":"https://www.wikidata.org/wiki/Q844605","display_name":"Backward compatibility","level":2,"score":0.3815999925136566},{"id":"https://openalex.org/C133112747","wikidata":"https://www.wikidata.org/wiki/Q7251931","display_name":"Protocol analysis","level":2,"score":0.3815999925136566},{"id":"https://openalex.org/C133112747","wikidata":"https://www.wikidata.org/wiki/Q7251931","display_name":"Protocol analysis","level":2,"score":0.3815000057220459},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.3813000023365021},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.3813000023365021},{"id":"https://openalex.org/C174348530","wikidata":"https://www.wikidata.org/wiki/Q188635","display_name":"Bridging (networking)","level":2,"score":0.3790999948978424},{"id":"https://openalex.org/C174348530","wikidata":"https://www.wikidata.org/wiki/Q188635","display_name":"Bridging (networking)","level":2,"score":0.3790999948978424},{"id":"https://openalex.org/C131275738","wikidata":"https://www.wikidata.org/wiki/Q7445023","display_name":"Security bug","level":5,"score":0.3646000027656555},{"id":"https://openalex.org/C131275738","wikidata":"https://www.wikidata.org/wiki/Q7445023","display_name":"Security bug","level":5,"score":0.3646000027656555},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.3614000082015991},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.3614000082015991},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.33160001039505005},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.33160001039505005},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.30149999260902405},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.2888999879360199},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.2888999879360199},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.2791999876499176}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:https://cyberleninka.ru/article/n/prompt-injection-attacks-on-agentic-coding-assistants-a-systematic-analysis-of-vulnerabilities-in-skills-tools-and-protocol","is_oa":false,"landing_page_url":"https://cyberleninka.ru/article/n/prompt-injection-attacks-on-agentic-coding-assistants-a-systematic-analysis-of-vulnerabilities-in-skills-tools-and-protocol","pdf_url":null,"source":{"id":"https://openalex.org/S4306401404","display_name":"CyberLeninK (CyberLeninka)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"doi:10.48550/arxiv.2601.17548","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.17548","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2601.17548","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.17548","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0],"proliferation":[1],"of":[2,59,68,141,177],"agentic":[3,73],"AI":[4],"coding":[5,74],"assistants,":[6],"including":[7],"Claude":[8],"Code,":[9],"GitHub":[10],"Copilot,":[11],"Cursor,":[12],"and":[13,36,89,134,185],"emerging":[14],"skill-based":[15,178],"architectures,":[16],"has":[17],"fundamentally":[18],"transformed":[19],"software":[20],"development":[21],"workflows.":[22],"These":[23],"systems":[24],"leverage":[25],"Large":[26],"Language":[27],"Models":[28],"(LLMs)":[29],"integrated":[30],"with":[31,181],"external":[32],"tools,":[33],"file":[34],"systems,":[35],"shell":[37],"access":[38],"through":[39],"protocols":[40],"like":[41],"the":[42,173,192,200],"Model":[43],"Context":[44],"Protocol":[45],"(MCP).":[46],"However,":[47],"this":[48,57],"expanded":[49],"capability":[50],"surface":[51],"introduces":[52],"critical":[53,139],"security":[54,201],"vulnerabilities.":[55],"In":[56],"\\textbf{Systematization":[58],"Knowledge":[60],"(SoK)}":[61],"paper,":[62],"we":[63,149,194],"present":[64],"a":[65,78,165,187,208],"comprehensive":[66],"analysis":[67,140,176],"prompt":[69,205],"injection":[70,206],"attacks":[71,83],"targeting":[72],"assistants.":[75],"We":[76,118,162],"propose":[77],"novel":[79],"three-dimensional":[80],"taxonomy":[81,167],"categorizing":[82],"across":[84],"\\textit{delivery":[85],"vectors},":[86],"\\textit{attack":[87],"modalities},":[88],"\\textit{propagation":[90],"behaviors}.":[91],"Our":[92,196],"meta-analysis":[93],"synthesizes":[94],"findings":[95,197],"from":[96],"78":[97],"recent":[98],"studies":[99],"(2021--2026),":[100],"consolidating":[101],"evidence":[102],"that":[103,151,199],"attack":[104,114,123,170],"success":[105],"rates":[106],"against":[107,158],"state-of-the-art":[108],"defenses":[109],"exceed":[110],"85\\%":[111],"when":[112],"adaptive":[113,160],"strategies":[115],"are":[116],"employed.":[117],"systematically":[119],"catalog":[120],"42":[121],"distinct":[122],"techniques":[124],"spanning":[125],"input":[126],"manipulation,":[127],"tool":[128],"poisoning,":[129],"protocol":[130],"exploitation,":[131],"multimodal":[132],"injection,":[133],"cross-origin":[135],"context":[136],"poisoning.":[137],"Through":[138],"18":[142],"defense":[143],"mechanisms":[144],"reported":[145],"in":[146,191],"prior":[147],"work,":[148],"identify":[150],"most":[152],"achieve":[153],"less":[154],"than":[155,216],"50\\%":[156],"mitigation":[157],"sophisticated":[159],"attacks.":[161],"contribute:":[163],"(1)":[164],"unified":[166],"bridging":[168],"disparate":[169],"classifications,":[171],"(2)":[172],"first":[174],"systematic":[175],"architecture":[179],"vulnerabilities":[180],"concrete":[182],"exploit":[183],"chains,":[184],"(3)":[186],"defense-in-depth":[188],"framework":[189],"grounded":[190],"limitations":[193],"identify.":[195],"indicate":[198],"community":[202],"must":[203],"treat":[204],"as":[207],"first-class":[209],"vulnerability":[210],"class":[211],"requiring":[212],"architectural-level":[213],"mitigations":[214],"rather":[215],"ad-hoc":[217],"filtering":[218],"approaches.":[219]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2026-01-28T00:00:00"}
