Install
openclaw skills install agentvulnly-vulnerability-scannerScan AI agents for security vulnerabilities including token theft, prompt injection, command injection, tool poisoning, and rug pull attacks. Use when auditi...
openclaw skills install agentvulnly-vulnerability-scannerScan AI agent deployments for 7 critical security vulnerabilities. Analyzes agent architecture, framework, tools, authentication, data flow, and security controls to identify token theft, prompt injection, command injection, tool poisoning, rug pull attacks, and more. Returns vulnerability findings with impact scores, exploitability ratings, and remediation guidance.
Built by a CISSP/CISM certified security professional at ToolWeb.in
TOOLWEB_API_KEY — Get your API key from portal.toolweb.incurl must be available on the systemPOST https://portal.toolweb.in/apis/security/agentvulnly
| ID | Vulnerability | Impact | Exploitability |
|---|---|---|---|
| AVULN-001 | Token / Credential Theft | 8/10 | Easy |
| AVULN-002 | Token Passthrough | 8/10 | Easy |
| AVULN-003 | Rug Pull Attack | 7/10 | Easy |
| AVULN-004 | Prompt Injection | 10/10 | Trivial |
| AVULN-005 | Command Injection | 10/10 | Easy |
| AVULN-006 | Tool Poisoning | —/10 | — |
| AVULN-007 | Unauthenticated Access | —/10 | — |
Gather inputs about the AI agent architecture:
Agent identity:
agentName — Name of the agent (e.g., "My OpenClaw Agent", "Customer Support Bot")agentDescription — What the agent doesagentFramework — Framework used (e.g., "OpenClaw", "LangChain", "CrewAI", "AutoGen", "Custom")llmProvider — LLM backend (e.g., "Anthropic Claude", "OpenAI GPT-4", "Local Ollama", "Google Gemini")Architecture details:
toolsUsed — List of tools/skills, e.g., ["web_browsing", "file_access", "code_execution", "shell_commands", "email", "calendar", "github"] (default: [])authMechanism — How the agent authenticates (e.g., "API keys in environment", "OAuth tokens", "No authentication", "JWT tokens")dataFlow — How data moves through the agent (e.g., "User → Agent → LLM → Tools → User", "Bidirectional with external APIs")deploymentType — Where it runs (e.g., "Local machine", "Cloud server", "Docker container", "Kubernetes")tokenHandling — How tokens/credentials are managed (e.g., "Environment variables", "Hardcoded", "Vault/secrets manager", "Config file")inputSanitization — Input validation approach (e.g., "None", "Basic filtering", "Comprehensive validation", "ML-based detection")dependencyManagement — How dependencies are managed (e.g., "npm/pip install", "Locked versions", "Vendored", "No management")accessControl — Access control model (e.g., "No restrictions", "Role-based", "Sandboxed", "Human-in-the-loop for sensitive actions")Security flags (true/false):
mcpServers — Uses MCP servers? (default: false)multiAgent — Multi-agent system? (default: false)humanInLoop — Human approval for actions? (default: false)loggingEnabled — Audit logging enabled? (default: false)sandboxed — Runs in a sandbox? (default: false)rateLimited — Rate limiting in place? (default: false)Call the API:
curl -s -X POST "https://portal.toolweb.in/apis/security/agentvulnly" \
-H "Content-Type: application/json" \
-H "X-API-Key: $TOOLWEB_API_KEY" \
-d '{
"scanData": {
"agentName": "<name>",
"agentDescription": "<description>",
"agentFramework": "<framework>",
"llmProvider": "<provider>",
"toolsUsed": ["<tool1>", "<tool2>"],
"authMechanism": "<auth>",
"dataFlow": "<flow>",
"deploymentType": "<deployment>",
"tokenHandling": "<handling>",
"inputSanitization": "<sanitization>",
"dependencyManagement": "<deps>",
"accessControl": "<access>",
"mcpServers": true,
"multiAgent": false,
"humanInLoop": true,
"loggingEnabled": true,
"sandboxed": false,
"rateLimited": true
},
"sessionId": "<unique-id>",
"timestamp": "<ISO-timestamp>"
}'
🔍 AI Agent Vulnerability Scan Report
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Agent: [agentName]
Framework: [agentFramework] | LLM: [llmProvider]
Deployment: [deploymentType]
🔴 CRITICAL Vulnerabilities:
AVULN-004: Prompt Injection — Impact: 10/10
AVULN-005: Command Injection — Impact: 10/10
🟠 HIGH Vulnerabilities:
AVULN-001: Token Theft — Impact: 8/10
AVULN-002: Token Passthrough — Impact: 8/10
🟡 MEDIUM Vulnerabilities:
AVULN-003: Rug Pull Attack — Impact: 7/10
✅ Security Controls Detected:
[List of controls in place]
🔧 Remediation Priority:
1. [Fix] — Addresses AVULN-004
2. [Fix] — Addresses AVULN-005
3. [Fix] — Addresses AVULN-001
📎 Full scan report powered by ToolWeb.in
TOOLWEB_API_KEY is not set: Tell the user to get an API key from https://portal.toolweb.inUser: "Scan my OpenClaw agent for vulnerabilities"
Agent flow:
Created by ToolWeb.in — a security-focused MicroSaaS platform with 200+ security APIs, built by a CISSP & CISM certified professional. Trusted by security teams in USA, UK, and Europe and we have platforms for "Pay-per-run", "API Gateway", "MCP Server", "OpenClaw", "RapidAPI" for execution and YouTube channel for demos.