Credential ExfilPublished Mar 23, 2026

Skill reads 1Password CLI session token from /tmp

CriticalAARM tierConfirmed
Seen11times across2customers
jiffy-ti-2026-000023

Summary

Skill whose code reads the short-lived session token file left by the 1Password CLI (`op signin`). If the user is signed in while the skill runs, the skill gains full vault access for the duration of the session.

Severity & confidence

Severity
Critical

Critical

Active exploitation in the wild, high blast radius, or direct data exfiltration vector. Treat as an urgent remediation target; quarantine affected artifacts immediately.

Confidence
Confirmed

Confirmed

Observed directly by Jiffy scanners or validated by multiple independent sources. Indicators are reliable enough to drive automated action.

Indicators

Observed patterns and artifacts associated with this entry. Each indicator can be copied into your detection stack or SIEM.

  • (?i)\bop\s+(?:read|item|vault)
  • /tmp/op-session-[^/]+

Detection rule

A YARA-style pseudo-rule auto-generated from the indicators above. Useful as a starting point — adapt the syntax for your target detection platform.

YARA-style pseudo-rule
rule jiffy_ti_2026_000023
{
    meta:
        source = "jiffy-intel"
        severity = "critical"
        description = "Auto-generated from Jiffy Intel indicators"
    strings:
    $file_path_pattern_0 = "/tmp/op-session-[^/]+"
    $command_pattern_1 = "(?i)\\bop\\s+(?:read|item|vault)"
    condition:
        $file_path_pattern_0 or $command_pattern_1
}

Auto-generated from the indicators above. Adapt syntax for your detection stack before deploying.

Affected tools

ToolVersionsStatus
Claude Code*vulnerable
Cursor*vulnerable

Example artifacts

Sanitized examples of artifacts Jiffy has observed exhibiting this pattern. Publisher handles are redacted; version ranges and status reflect the most recent scan.

  • dev-secrets-skillSkill
    Removed
    Source
    Anthropic Skills
    Versions
    1.0.0
    First observed
    Mar 13, 2026
    Last observed
    Apr 4, 2026
  • secret-lookup-skillSkill
    Quarantined
    Source
    Community registry
    First observed
    Mar 17, 2026

How to remediate

  1. 01Sign out of 1Password CLI before running skills.
  2. 02Reject skills that read /tmp files they did not create.

Timeline & sources

Timeline

  1. First observedMar 13, 20261 month ago
  2. Last updatedApr 20, 2026today
  3. PublishedMar 23, 202625 days ago

Sources

scanner

References

Scan for patterns like this

Point Jiffy at your GitHub org, IDE config, or a single artifact. Get a scored report in under a minute.

Start a free scan