Sorry? What? Who uses SSH without an agent on their local machine? Why is SSH (as a protocol) singled out here? Any interactive session over the network is open to this form of "attack" and if you type SSH passwords into remote machines over the network (whether already SSH wrapped ot not) you are already broken.