What is a Supply Chain Attack?
A supply chain attack compromises software by targeting its dependencies, build tools, or distribution channels — injecting malicious code through trusted third-party components rather than attacking the target directly.
WHY IT MATTERS
Modern software is built on layers of dependencies. An AI agent might depend on an LLM SDK, a blockchain library, a wallet library, and dozens of transitive dependencies. Compromising any one of these compromises every application that uses it.
In crypto, supply chain attacks are particularly devastating. The Ledger Connect Kit exploit (2023) injected a wallet drainer into a widely-used JavaScript library, draining funds from users across multiple dApps. The attack surface is massive — npm, pip, and cargo packages are all potential vectors.
For AI agents, the supply chain includes LLM providers (a compromised API could manipulate agent behavior), tool implementations (malicious MCP servers), framework libraries, and key management SDKs. Each dependency is a trust boundary.
HOW POLICYLAYER USES THIS
PolicyLayer defends against supply chain attacks that might compromise agent spending behavior. Even if a dependency is compromised and the agent is manipulated, PolicyLayer's independently-enforced spending limits prevent unauthorized fund transfers.