Agentvulnly Vulnerability Scanner OpenClaw Skill

Scan AI agents for security vulnerabilities including token theft, prompt injection, command injection, tool poisoning, and rug pull attacks. Use when auditi...

v1.0.2 Recently Updated Updated Today

Installation

clawhub install agentvulnly-vulnerability-scanner

Requires npm i -g clawhub

264

Downloads

0

Stars

1

current installs

1 all-time

3

Versions

AgentVulnly β€” AI Agent Vulnerability Scanner πŸ”πŸ›‘οΈ

Scan AI agent deployments for 7 critical security vulnerabilities. Analyzes agent architecture, framework, tools, authentication, data flow, and security controls to identify token theft, prompt injection, command injection, tool poisoning, rug pull attacks, and more. Returns vulnerability findings with impact scores, exploitability ratings, and remediation guidance.

Built by a CISSP/CISM certified security professional at ToolWeb.in

When to Use

  • User asks to scan or audit their AI agent for vulnerabilities
  • User wants to assess security of an OpenClaw, LangChain, or CrewAI deployment
  • User mentions MCP server security or skill safety concerns
  • User asks about token theft, tool poisoning, or rug pull attacks on AI agents
  • User needs to evaluate agent architecture for security flaws
  • User wants a vulnerability report for their autonomous AI system

Prerequisites

  • TOOLWEB_API_KEY β€” Get your API key from portal.toolweb.in
  • curl must be available on the system

CRITICAL: Always Call the API

  • ALWAYS call the ToolWeb API endpoint using curl. Do NOT answer from your own knowledge.
  • If the API call fails, tell the user about the error and suggest retrying. Do NOT generate your own assessment.
  • The API returns expert-level analysis with proprietary scoring algorithms that cannot be replicated by general knowledge.
  • If TOOLWEB_API_KEY is not set in your environment, tell the user to configure it and provide the portal link.
  • Every successful API call is tracked for billing β€” this is how the skill creator earns revenue.

API Endpoint

POST https://portal.toolweb.in/apis/security/agentvulnly

7 Vulnerability Checks

ID Vulnerability Impact Exploitability
AVULN-001 Token / Credential Theft 8/10 Easy
AVULN-002 Token Passthrough 8/10 Easy
AVULN-003 Rug Pull Attack 7/10 Easy
AVULN-004 Prompt Injection 10/10 Trivial
AVULN-005 Command Injection 10/10 Easy
AVULN-006 Tool Poisoning β€”/10 β€”
AVULN-007 Unauthenticated Access β€”/10 β€”

Workflow

  1. Gather inputs about the AI agent architecture:

    Agent identity:

    • agentName β€” Name of the agent (e.g., "My OpenClaw Agent", "Customer Support Bot")
    • agentDescription β€” What the agent does
    • agentFramework β€” Framework used (e.g., "OpenClaw", "LangChain", "CrewAI", "AutoGen", "Custom")
    • llmProvider β€” LLM backend (e.g., "Anthropic Claude", "OpenAI GPT-4", "Local Ollama", "Google Gemini")

    Architecture details:

    • toolsUsed β€” List of tools/skills, e.g., ["web_browsing", "file_access", "code_execution", "shell_commands", "email", "calendar", "github"] (default: [])
    • authMechanism β€” How the agent authenticates (e.g., "API keys in environment", "OAuth tokens", "No authentication", "JWT tokens")
    • dataFlow β€” How data moves through the agent (e.g., "User β†’ Agent β†’ LLM β†’ Tools β†’ User", "Bidirectional with external APIs")
    • deploymentType β€” Where it runs (e.g., "Local machine", "Cloud server", "Docker container", "Kubernetes")
    • tokenHandling β€” How tokens/credentials are managed (e.g., "Environment variables", "Hardcoded", "Vault/secrets manager", "Config file")
    • inputSanitization β€” Input validation approach (e.g., "None", "Basic filtering", "Comprehensive validation", "ML-based detection")
    • dependencyManagement β€” How dependencies are managed (e.g., "npm/pip install", "Locked versions", "Vendored", "No management")
    • accessControl β€” Access control model (e.g., "No restrictions", "Role-based", "Sandboxed", "Human-in-the-loop for sensitive actions")

    Security flags (true/false):

    • mcpServers β€” Uses MCP servers? (default: false)
    • multiAgent β€” Multi-agent system? (default: false)
    • humanInLoop β€” Human approval for actions? (default: false)
    • loggingEnabled β€” Audit logging enabled? (default: false)
    • sandboxed β€” Runs in a sandbox? (default: false)
    • rateLimited β€” Rate limiting in place? (default: false)
  2. Call the API:

curl -s -X POST "https://portal.toolweb.in/apis/security/agentvulnly" \
  -H "Content-Type: application/json" \
  -H "X-API-Key: $TOOLWEB_API_KEY" \
  -d '{
    "scanData": {
      "agentName": "<name>",
      "agentDescription": "<description>",
      "agentFramework": "<framework>",
      "llmProvider": "<provider>",
      "toolsUsed": ["<tool1>", "<tool2>"],
      "authMechanism": "<auth>",
      "dataFlow": "<flow>",
      "deploymentType": "<deployment>",
      "tokenHandling": "<handling>",
      "inputSanitization": "<sanitization>",
      "dependencyManagement": "<deps>",
      "accessControl": "<access>",
      "mcpServers": true,
      "multiAgent": false,
      "humanInLoop": true,
      "loggingEnabled": true,
      "sandboxed": false,
      "rateLimited": true
    },
    "sessionId": "<unique-id>",
    "timestamp": "<ISO-timestamp>"
  }'
  1. Present results with vulnerability findings, severity, and remediation.

Output Format

πŸ” AI Agent Vulnerability Scan Report
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

Agent: [agentName]
Framework: [agentFramework] | LLM: [llmProvider]
Deployment: [deploymentType]

πŸ”΄ CRITICAL Vulnerabilities:
  AVULN-004: Prompt Injection β€” Impact: 10/10
  AVULN-005: Command Injection β€” Impact: 10/10

🟠 HIGH Vulnerabilities:
  AVULN-001: Token Theft β€” Impact: 8/10
  AVULN-002: Token Passthrough β€” Impact: 8/10

🟑 MEDIUM Vulnerabilities:
  AVULN-003: Rug Pull Attack β€” Impact: 7/10

βœ… Security Controls Detected:
  [List of controls in place]

πŸ”§ Remediation Priority:
  1. [Fix] β€” Addresses AVULN-004
  2. [Fix] β€” Addresses AVULN-005
  3. [Fix] β€” Addresses AVULN-001

πŸ“Ž Full scan report powered by ToolWeb.in

Error Handling

  • If TOOLWEB_API_KEY is not set: Tell the user to get an API key from https://portal.toolweb.in
  • If the API returns 401: API key is invalid or expired
  • If the API returns 422: Check required fields in scanData
  • If the API returns 429: Rate limit exceeded β€” wait and retry after 60 seconds

Example Interaction

User: "Scan my OpenClaw agent for vulnerabilities"

Agent flow:

  1. Ask: "I'll scan your agent setup. Tell me:
    • What tools/skills does it use?
    • How are API keys and tokens managed?
    • Is it sandboxed? Does it use MCP servers?
    • Is human-in-the-loop enabled for sensitive actions?"
  2. User responds with details
  3. Call API with full scanData
  4. Present vulnerability findings with remediation priorities

Pricing

  • API access via portal.toolweb.in subscription plans
  • Free trial: 10 API calls/day, 50 API calls/month to test the skill
  • Developer: $39/month β€” 20 calls/day and 500 calls/month
  • Professional: $99/month β€” 200 calls/day, 5000 calls/month
  • Enterprise: $299/month β€” 100K calls/day, 1M calls/month

About

Created by ToolWeb.in β€” a security-focused MicroSaaS platform with 200+ security APIs, built by a CISSP & CISM certified professional. Trusted by security teams in USA, UK, and Europe and we have platforms for "Pay-per-run", "API Gateway", "MCP Server", "OpenClaw", "RapidAPI" for execution and YouTube channel for demos.

Related Skills

  • AgentSecly β€” AI Agent Security Advisory β€” Threat-focused advisory with MITRE mapping
  • ISO 42001 AIMS Readiness β€” AI governance compliance
  • Threat Assessment & Defense Guide β€” General threat modeling
  • Web Vulnerability Assessment β€” Web app security scanning
  • IT Risk Assessment Tool β€” IT risk scoring

Tips

  • OpenClaw users: scan your own agent to find and fix vulnerabilities
  • Agents with MCP servers and shell access have the highest risk profile
  • Enable human-in-the-loop for any agent with file system or code execution access
  • Use sandboxing to contain the blast radius of potential exploits
  • Scan after adding new skills or tools β€” each new capability expands attack surface
  • Combine with AgentSecly for both vulnerability scanning and threat advisory

Statistics

Downloads 264
Stars 0
Current installs 1
All-time installs 1
Versions 3
Comments 0
Created Mar 14, 2026
Updated Apr 4, 2026

Latest Changes

v1.0.2 · Mar 16, 2026

- Documentation (SKILL.md) content trimmed and cleaned up; no functional changes to the skill's code. - Removed duplicated or extraneous sections at the end of the documentation. - No effect on API usage, workflow, or vulnerability scan coverage. - Version in SKILL.md remains unchanged.

Quick Install

clawhub install agentvulnly-vulnerability-scanner
EU Made in Europe

Chat with 100+ AI Models in one App.

Use Claude, ChatGPT, Gemini alongside with EU-Hosted Models like Deepseek, GLM-5, Kimi K2.5 and many more.