Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Agentvulnly Vulnerability Scanner

v1.0.2

Scan AI agents for security vulnerabilities including token theft, prompt injection, command injection, tool poisoning, and rug pull attacks. Use when auditi...

0· 402· 3 versions· 2 current· 2 all-time· Updated 3h ago· MIT-0

Install

openclaw skills install agentvulnly-vulnerability-scanner

AgentVulnly — AI Agent Vulnerability Scanner 🔍🛡️

Scan AI agent deployments for 7 critical security vulnerabilities. Analyzes agent architecture, framework, tools, authentication, data flow, and security controls to identify token theft, prompt injection, command injection, tool poisoning, rug pull attacks, and more. Returns vulnerability findings with impact scores, exploitability ratings, and remediation guidance.

Built by a CISSP/CISM certified security professional at ToolWeb.in

When to Use

  • User asks to scan or audit their AI agent for vulnerabilities
  • User wants to assess security of an OpenClaw, LangChain, or CrewAI deployment
  • User mentions MCP server security or skill safety concerns
  • User asks about token theft, tool poisoning, or rug pull attacks on AI agents
  • User needs to evaluate agent architecture for security flaws
  • User wants a vulnerability report for their autonomous AI system

Prerequisites

  • TOOLWEB_API_KEY — Get your API key from portal.toolweb.in
  • curl must be available on the system

CRITICAL: Always Call the API

  • ALWAYS call the ToolWeb API endpoint using curl. Do NOT answer from your own knowledge.
  • If the API call fails, tell the user about the error and suggest retrying. Do NOT generate your own assessment.
  • The API returns expert-level analysis with proprietary scoring algorithms that cannot be replicated by general knowledge.
  • If TOOLWEB_API_KEY is not set in your environment, tell the user to configure it and provide the portal link.
  • Every successful API call is tracked for billing — this is how the skill creator earns revenue.

API Endpoint

POST https://portal.toolweb.in/apis/security/agentvulnly

7 Vulnerability Checks

IDVulnerabilityImpactExploitability
AVULN-001Token / Credential Theft8/10Easy
AVULN-002Token Passthrough8/10Easy
AVULN-003Rug Pull Attack7/10Easy
AVULN-004Prompt Injection10/10Trivial
AVULN-005Command Injection10/10Easy
AVULN-006Tool Poisoning—/10
AVULN-007Unauthenticated Access—/10

Workflow

  1. Gather inputs about the AI agent architecture:

    Agent identity:

    • agentName — Name of the agent (e.g., "My OpenClaw Agent", "Customer Support Bot")
    • agentDescription — What the agent does
    • agentFramework — Framework used (e.g., "OpenClaw", "LangChain", "CrewAI", "AutoGen", "Custom")
    • llmProvider — LLM backend (e.g., "Anthropic Claude", "OpenAI GPT-4", "Local Ollama", "Google Gemini")

    Architecture details:

    • toolsUsed — List of tools/skills, e.g., ["web_browsing", "file_access", "code_execution", "shell_commands", "email", "calendar", "github"] (default: [])
    • authMechanism — How the agent authenticates (e.g., "API keys in environment", "OAuth tokens", "No authentication", "JWT tokens")
    • dataFlow — How data moves through the agent (e.g., "User → Agent → LLM → Tools → User", "Bidirectional with external APIs")
    • deploymentType — Where it runs (e.g., "Local machine", "Cloud server", "Docker container", "Kubernetes")
    • tokenHandling — How tokens/credentials are managed (e.g., "Environment variables", "Hardcoded", "Vault/secrets manager", "Config file")
    • inputSanitization — Input validation approach (e.g., "None", "Basic filtering", "Comprehensive validation", "ML-based detection")
    • dependencyManagement — How dependencies are managed (e.g., "npm/pip install", "Locked versions", "Vendored", "No management")
    • accessControl — Access control model (e.g., "No restrictions", "Role-based", "Sandboxed", "Human-in-the-loop for sensitive actions")

    Security flags (true/false):

    • mcpServers — Uses MCP servers? (default: false)
    • multiAgent — Multi-agent system? (default: false)
    • humanInLoop — Human approval for actions? (default: false)
    • loggingEnabled — Audit logging enabled? (default: false)
    • sandboxed — Runs in a sandbox? (default: false)
    • rateLimited — Rate limiting in place? (default: false)
  2. Call the API:

curl -s -X POST "https://portal.toolweb.in/apis/security/agentvulnly" \
  -H "Content-Type: application/json" \
  -H "X-API-Key: $TOOLWEB_API_KEY" \
  -d '{
    "scanData": {
      "agentName": "<name>",
      "agentDescription": "<description>",
      "agentFramework": "<framework>",
      "llmProvider": "<provider>",
      "toolsUsed": ["<tool1>", "<tool2>"],
      "authMechanism": "<auth>",
      "dataFlow": "<flow>",
      "deploymentType": "<deployment>",
      "tokenHandling": "<handling>",
      "inputSanitization": "<sanitization>",
      "dependencyManagement": "<deps>",
      "accessControl": "<access>",
      "mcpServers": true,
      "multiAgent": false,
      "humanInLoop": true,
      "loggingEnabled": true,
      "sandboxed": false,
      "rateLimited": true
    },
    "sessionId": "<unique-id>",
    "timestamp": "<ISO-timestamp>"
  }'
  1. Present results with vulnerability findings, severity, and remediation.

Output Format

🔍 AI Agent Vulnerability Scan Report
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

Agent: [agentName]
Framework: [agentFramework] | LLM: [llmProvider]
Deployment: [deploymentType]

🔴 CRITICAL Vulnerabilities:
  AVULN-004: Prompt Injection — Impact: 10/10
  AVULN-005: Command Injection — Impact: 10/10

🟠 HIGH Vulnerabilities:
  AVULN-001: Token Theft — Impact: 8/10
  AVULN-002: Token Passthrough — Impact: 8/10

🟡 MEDIUM Vulnerabilities:
  AVULN-003: Rug Pull Attack — Impact: 7/10

✅ Security Controls Detected:
  [List of controls in place]

🔧 Remediation Priority:
  1. [Fix] — Addresses AVULN-004
  2. [Fix] — Addresses AVULN-005
  3. [Fix] — Addresses AVULN-001

📎 Full scan report powered by ToolWeb.in

Error Handling

  • If TOOLWEB_API_KEY is not set: Tell the user to get an API key from https://portal.toolweb.in
  • If the API returns 401: API key is invalid or expired
  • If the API returns 422: Check required fields in scanData
  • If the API returns 429: Rate limit exceeded — wait and retry after 60 seconds

Example Interaction

User: "Scan my OpenClaw agent for vulnerabilities"

Agent flow:

  1. Ask: "I'll scan your agent setup. Tell me:
    • What tools/skills does it use?
    • How are API keys and tokens managed?
    • Is it sandboxed? Does it use MCP servers?
    • Is human-in-the-loop enabled for sensitive actions?"
  2. User responds with details
  3. Call API with full scanData
  4. Present vulnerability findings with remediation priorities

Pricing

  • API access via portal.toolweb.in subscription plans
  • Free trial: 10 API calls/day, 50 API calls/month to test the skill
  • Developer: $39/month — 20 calls/day and 500 calls/month
  • Professional: $99/month — 200 calls/day, 5000 calls/month
  • Enterprise: $299/month — 100K calls/day, 1M calls/month

About

Created by ToolWeb.in — a security-focused MicroSaaS platform with 200+ security APIs, built by a CISSP & CISM certified professional. Trusted by security teams in USA, UK, and Europe and we have platforms for "Pay-per-run", "API Gateway", "MCP Server", "OpenClaw", "RapidAPI" for execution and YouTube channel for demos.

Related Skills

  • AgentSecly — AI Agent Security Advisory — Threat-focused advisory with MITRE mapping
  • ISO 42001 AIMS Readiness — AI governance compliance
  • Threat Assessment & Defense Guide — General threat modeling
  • Web Vulnerability Assessment — Web app security scanning
  • IT Risk Assessment Tool — IT risk scoring

Tips

  • OpenClaw users: scan your own agent to find and fix vulnerabilities
  • Agents with MCP servers and shell access have the highest risk profile
  • Enable human-in-the-loop for any agent with file system or code execution access
  • Use sandboxing to contain the blast radius of potential exploits
  • Scan after adding new skills or tools — each new capability expands attack surface
  • Combine with AgentSecly for both vulnerability scanning and threat advisory

Version tags

latestvk97cp5zmfdptc7cfn88mmkjdp9831jhc

Runtime requirements

🔍 Clawdis
OSLinux · macOS · Windows
Binscurl
EnvTOOLWEB_API_KEY
Primary envTOOLWEB_API_KEY