Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Backslash adds cross-product support to secure AI skills in developer environments
    Cybersecurity

    Backslash adds cross-product support to secure AI skills in developer environments

    adminBy adminMarch 18, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Tosi Platform delivers unified connectivity, visibility, and security for OT at scale
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Backslash Security has revealed new cross-product support for agentic AI Skills within its platform, enabling organizations to discover, assess, and apply security guardrails to Skills used across AI-native software development environments.

    The developer ecosystem of AI-powered coding agents and tools is rapidly expanding with new extensibility layers, including Skills, Model Context Protocol (MCP) servers, prompt rules, hooks, and plug-in architectures. As these capabilities enhance and automate developer productivity, they also introduce significant new security blind spots.

    Skills extend the capabilities of AI agents through externally defined instructions, for example, allowing a coding agent to read and modify files, access secrets from environment variables, or install packages from external registries. Because Skills are often community-authored with broad permissions, they can introduce risks ranging from data exfiltration to unauthorized code execution, making it difficult for security teams to understand or control how AI systems interact with code, data, and developer infrastructure.

    To address these risks, the Backslash platform now provides centralized visibility and security controls for Skills across AI coding environments. The new capability enables organizations to continuously discover Skills used in developer workflows, evaluate their risk posture, and define guardrails governing their use.

    Key features include:

    • Centralized discovery of Skills used by AI agents and AI-native IDEs
    • Skill vetting and risk assessment for excessive permissions and unsafe behaviors
    • Guardrail policies defining approved Skill usage and configuration
    • Cross-platform visibility across heterogeneous AI coding environments

    With centralized oversight of Skills and other AI coding components, security teams can ensure that organizations continue to benefit from the productivity gains of AI-driven development while maintaining strong governance and risk management.

    “AI coding environments are evolving at an extraordinary pace, and Skills are quickly becoming a powerful way to extend the capabilities of coding agents,” said Yossi Pik, CTO of Backslash Security.

    “But with that flexibility comes risk. Skills can combine with MCPs, rules, hooks, and plug-ins in ways that make it extremely difficult for organizations to understand what their AI systems are actually doing. Our platform enables security teams to see exactly what’s running within their AI dev environments – from Skills and MCP servers to plug-ins and prompt rules. Then it empowers them to create guardrails that enable them to stop attempts that violate policy and put the organization at risk,” Pik continued.

    The new capability extends the Backslash platform, which already provides discovery and governance for AI coding agents, IDEs, MCP servers, and LLMs. Adding Skills coverage closes a critical new gap, giving security teams a complete view of the stack from the model layer to the extensibility layer.

    adds Backslash crossproduct developer Environments secure skills Support
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous Article5 PC parts you didn’t know you could 3D print
    Next Article Where to focus technical SEO when you can’t do it all
    admin
    • Website

    Related Posts

    Medium-severity flaw in Microsoft SharePoint exploited

    April 16, 2026

    Critical Nginx UI auth bypass flaw now actively exploited in the wild

    April 16, 2026

    Exploited Vulnerability Exposes Nginx Servers to Hacking

    April 15, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    MKBHD pulls back the curtain on LG’s cancelled rollable

    April 16, 2026

    Medium-severity flaw in Microsoft SharePoint exploited

    April 16, 2026

    Google’s New Gemini App for Mac Comes With Two Key Benefits (and One Drawback)

    April 16, 2026

    OpenAI pulls out of a second Stargate data center deal

    April 16, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,336)
    • Privacy & Online Earning (168)
    • SEO & Digital Marketing (819)
    • Tech Tools & Mobile / Apps (1,599)
    • WiFi / Internet & Networking (225)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    MKBHD pulls back the curtain on LG’s cancelled rollable

    April 16, 2026

    Medium-severity flaw in Microsoft SharePoint exploited

    April 16, 2026

    Google’s New Gemini App for Mac Comes With Two Key Benefits (and One Drawback)

    April 16, 2026
    Most Popular
    • MKBHD pulls back the curtain on LG’s cancelled rollable
    • Medium-severity flaw in Microsoft SharePoint exploited
    • Google’s New Gemini App for Mac Comes With Two Key Benefits (and One Drawback)
    • OpenAI pulls out of a second Stargate data center deal
    • Critical Nginx UI auth bypass flaw now actively exploited in the wild
    • How To Become An AI Search Authority In SEO [Webinar]
    • Android 17 stops apps from demanding access to all your contacts
    • Exploited Vulnerability Exposes Nginx Servers to Hacking
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.