ShieldNet: Network-Level Guardrails against Emerging Supply-Chain Injections in Agentic Systems

arXiv cs.AI / 4/7/2026

💬 OpinionDeveloper Stack & InfrastructureIdeas & Deep AnalysisModels & Research

Key Points

  • The paper argues that LLM agent security is expanding beyond prompt injection to supply-chain threats, where malicious behaviors are hidden inside third-party tools or MCP servers that agents call during execution.
  • It introduces SC-Inject-Bench, a new large-scale benchmark of 10,000+ malicious MCP tools organized by a taxonomy of 25+ supply-chain attack types mapped to MITRE ATT&CK.
  • The authors report that existing MCP scanners and semantic guardrails underperform on this new benchmark, motivating the need for defenses that go deeper than tool traces.
  • They propose ShieldNet, a network-level guardrail framework using a MITM proxy plus an event extractor and lightweight classifier to detect supply-chain poisoning by analyzing real network interactions.
  • Experiments indicate ShieldNet can reach up to 0.995 F1 with about 0.8% false positives while adding little runtime overhead, outperforming prior scanners and LLM-based guardrails.

Abstract

Existing research on LLM agent security mainly focuses on prompt injection and unsafe input/output behaviors. However, as agents increasingly rely on third-party tools and MCP servers, a new class of supply-chain threats has emerged, where malicious behaviors are embedded in seemingly benign tools, silently hijacking agent execution, leaking sensitive data, or triggering unauthorized actions. Despite their growing impact, there is currently no comprehensive benchmark for evaluating such threats. To bridge this gap, we introduce SC-Inject-Bench, a large-scale benchmark comprising over 10,000 malicious MCP tools grounded in a taxonomy of 25+ attack types derived from MITRE ATT&CK targeting supply-chain threats. We observe that existing MCP scanners and semantic guardrails perform poorly on this benchmark. Motivated by this finding, we propose ShieldNet, a network-level guardrail framework that detects supply-chain poisoning by observing real network interactions rather than surface-level tool traces. ShieldNet integrates a man-in-the-middle (MITM) proxy and an event extractor to identify critical network behaviors, which are then processed by a lightweight classifier for attack detection. Extensive experiments show that ShieldNet achieves strong detection performance (up to 0.995 F-1 with only 0.8% false positives) while introducing little runtime overhead, substantially outperforming existing MCP scanners and LLM-based guardrails.