clawmoat 0.5.0 → 0.8.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CONTRIBUTING.md +4 -2
- package/README.md +86 -3
- package/SECURITY.md +58 -10
- package/bin/clawmoat.js +298 -1
- package/clawmoat-0.8.0.tgz +0 -0
- package/docs/blog/386-malicious-skills.html +255 -0
- package/docs/blog/40000-exposed-openclaw-instances.html +194 -0
- package/docs/blog/agent-trust-protocol.html +197 -0
- package/docs/blog/clawmoat-vs-llamafirewall-nemo-guardrails.html +223 -0
- package/docs/blog/ibm-experts-agent-runtime-protection.html +238 -0
- package/docs/blog/index.html +168 -0
- package/docs/blog/mcp-30-cves-security-crisis.html +279 -0
- package/docs/blog/microsoft-openclaw-workstation-security.html +234 -0
- package/docs/blog/nist-ai-agent-standards-clawmoat.html +369 -0
- package/docs/blog/oasis-websocket-hijack.html +205 -0
- package/docs/blog/ollama-openclaw-security.html +154 -0
- package/docs/blog/openclaw-enterprise-readiness-claw10.html +198 -0
- package/docs/blog/openclaw-security-reckoning-2026.html +361 -0
- package/docs/blog/supply-chain-agents.html +166 -0
- package/docs/blog/supply-chain-agents.md +79 -0
- package/docs/business/index.html +530 -0
- package/docs/business/install.html +247 -0
- package/docs/checklist.html +168 -0
- package/docs/finance/index.html +217 -0
- package/docs/hall-of-fame.html +168 -0
- package/docs/index.html +328 -90
- package/docs/install.sh +557 -0
- package/docs/privacy-policy/index.html +122 -0
- package/docs/scan/index.html +214 -0
- package/docs/sitemap.xml +132 -2
- package/docs/support/index.html +124 -0
- package/docs/terms-of-service/index.html +122 -0
- package/examples/basic-usage.js +38 -0
- package/package.json +1 -1
- package/server/index.js +179 -14
- package/server/index.js.patch +1 -0
- package/src/finance/index.js +585 -0
- package/src/finance/mcp-firewall.js +486 -0
- package/src/guardian/cve-verify.js +129 -0
- package/src/guardian/gateway-monitor.js +590 -0
- package/src/guardian/index.js +3 -1
- package/src/guardian/insider-threat.js +498 -0
- package/src/index.js +3 -0
- package/src/middleware/openclaw.js +28 -1
|
@@ -0,0 +1,238 @@
|
|
|
1
|
+
<!DOCTYPE html>
|
|
2
|
+
<html lang="en">
|
|
3
|
+
<head>
|
|
4
|
+
<meta charset="UTF-8">
|
|
5
|
+
<meta name="viewport" content="width=device-width, initial-scale=1.0">
|
|
6
|
+
<title>IBM's AI Security Experts Agree: Your Agent Needs Runtime Protection | ClawMoat Blog</title>
|
|
7
|
+
<meta name="description" content="Three IBM security leaders — an IBM Fellow, an X-Force commander, and a Distinguished Engineer — lay out exactly why AI agents need runtime guardrails. Their concerns map directly to what ClawMoat protects.">
|
|
8
|
+
<meta name="keywords" content="IBM AI security, AI agent security, runtime protection, prompt injection, least privilege, ClawMoat, agentic AI risks, shadow AI">
|
|
9
|
+
<link rel="canonical" href="https://clawmoat.com/blog/ibm-experts-agent-runtime-protection.html">
|
|
10
|
+
<meta property="og:title" content="IBM's AI Security Experts Agree: Your Agent Needs Runtime Protection">
|
|
11
|
+
<meta property="og:description" content="Three IBM security leaders explain why AI agents need runtime guardrails. Their concerns map directly to ClawMoat.">
|
|
12
|
+
<meta property="og:url" content="https://clawmoat.com/blog/ibm-experts-agent-runtime-protection.html">
|
|
13
|
+
<meta property="og:type" content="article">
|
|
14
|
+
<link rel="icon" href="data:image/svg+xml,<svg xmlns='http://www.w3.org/2000/svg' viewBox='0 0 100 100'><text y='.9em' font-size='90'>🏰</text></svg>">
|
|
15
|
+
<style>
|
|
16
|
+
*{margin:0;padding:0;box-sizing:border-box}
|
|
17
|
+
:root{--navy:#0F172A;--navy-light:#1E293B;--navy-mid:#334155;--blue:#3B82F6;--emerald:#10B981;--white:#F8FAFC;--gray:#94A3B8;--red:#EF4444;--amber:#F59E0B;--purple:#8B5CF6}
|
|
18
|
+
body{font-family:-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif;background:var(--navy);color:var(--white);line-height:1.8}
|
|
19
|
+
a{color:var(--blue)}
|
|
20
|
+
.container{max-width:740px;margin:0 auto;padding:0 24px}
|
|
21
|
+
nav{background:rgba(15,23,42,.95);backdrop-filter:blur(12px);border-bottom:1px solid rgba(59,130,246,.15);padding:16px 0;position:fixed;top:0;left:0;right:0;z-index:100}
|
|
22
|
+
nav .container{display:flex;align-items:center;justify-content:space-between}
|
|
23
|
+
.logo{font-size:1.1rem;font-weight:700;color:var(--white);text-decoration:none}
|
|
24
|
+
.logo span{color:var(--emerald)}
|
|
25
|
+
nav a{color:var(--gray);font-size:.85rem;text-decoration:none}
|
|
26
|
+
nav a:hover{color:var(--white)}
|
|
27
|
+
article{padding:120px 0 80px}
|
|
28
|
+
.meta{color:var(--gray);font-size:.85rem;margin-bottom:32px}
|
|
29
|
+
h1{font-size:clamp(1.8rem,4vw,2.4rem);font-weight:800;line-height:1.2;margin-bottom:16px}
|
|
30
|
+
h2{font-size:1.3rem;font-weight:700;margin:40px 0 16px}
|
|
31
|
+
h3{font-size:1.05rem;font-weight:600;margin:28px 0 12px}
|
|
32
|
+
p{color:var(--gray);margin-bottom:20px;font-size:1rem}
|
|
33
|
+
blockquote{border-left:3px solid var(--purple);padding:16px 24px;margin:24px 0;background:var(--navy-light);border-radius:0 8px 8px 0}
|
|
34
|
+
blockquote p{color:var(--white);margin:0;font-style:italic}
|
|
35
|
+
blockquote .attr{color:var(--gray);font-size:.85rem;margin-top:8px;font-style:normal}
|
|
36
|
+
code{background:var(--navy-light);padding:2px 6px;border-radius:4px;font-size:.9rem;color:var(--emerald)}
|
|
37
|
+
pre{background:#0a0e17;border:1px solid var(--navy-mid);border-radius:8px;padding:20px;overflow-x:auto;margin:24px 0;font-size:.85rem;line-height:1.6}
|
|
38
|
+
pre code{background:none;padding:0}
|
|
39
|
+
ul,ol{color:var(--gray);margin:0 0 20px 24px}
|
|
40
|
+
li{margin-bottom:8px}
|
|
41
|
+
.cta{background:linear-gradient(135deg,rgba(139,92,246,.1),rgba(59,130,246,.1));border:1px solid rgba(139,92,246,.2);border-radius:12px;padding:32px;text-align:center;margin:48px 0}
|
|
42
|
+
.cta h3{margin:0 0 12px;color:var(--white)}
|
|
43
|
+
.cta p{margin:0 0 20px}
|
|
44
|
+
.cta a{display:inline-block;background:var(--emerald);color:#fff;padding:12px 28px;border-radius:8px;font-weight:600;text-decoration:none}
|
|
45
|
+
.cta a:hover{opacity:.9}
|
|
46
|
+
.expert-card{background:var(--navy-light);border:1px solid var(--navy-mid);border-radius:12px;padding:20px 24px;margin:20px 0}
|
|
47
|
+
.expert-card .name{color:var(--emerald);font-weight:700;font-size:.95rem}
|
|
48
|
+
.expert-card .title{color:var(--gray);font-size:.8rem;margin-bottom:8px}
|
|
49
|
+
.risk-box{background:rgba(239,68,68,.08);border:1px solid rgba(239,68,68,.2);border-radius:8px;padding:16px 20px;margin:16px 0}
|
|
50
|
+
.risk-box .label{color:var(--red);font-weight:700;font-size:.85rem;text-transform:uppercase;margin-bottom:4px}
|
|
51
|
+
.fix-box{background:rgba(16,185,129,.08);border:1px solid rgba(16,185,129,.2);border-radius:8px;padding:16px 20px;margin:16px 0}
|
|
52
|
+
.fix-box .label{color:var(--emerald);font-weight:700;font-size:.85rem;text-transform:uppercase;margin-bottom:4px}
|
|
53
|
+
</style>
|
|
54
|
+
</head>
|
|
55
|
+
<body>
|
|
56
|
+
<nav>
|
|
57
|
+
<div class="container">
|
|
58
|
+
<a href="/" class="logo">🏰 Claw<span>Moat</span></a>
|
|
59
|
+
<div style="display:flex;gap:20px">
|
|
60
|
+
<a href="/blog/">Blog</a>
|
|
61
|
+
<a href="/#features">Features</a>
|
|
62
|
+
<a href="/business/">For Business</a>
|
|
63
|
+
<a href="https://github.com/darfaz/clawmoat">GitHub</a>
|
|
64
|
+
</div>
|
|
65
|
+
</div>
|
|
66
|
+
</nav>
|
|
67
|
+
|
|
68
|
+
<article>
|
|
69
|
+
<div class="container">
|
|
70
|
+
|
|
71
|
+
<div class="meta">
|
|
72
|
+
<a href="/blog/" style="color:var(--gray)">← Back to Blog</a>
|
|
73
|
+
</div>
|
|
74
|
+
|
|
75
|
+
<h1>IBM's AI Security Experts Agree: Your Agent Needs Runtime Protection</h1>
|
|
76
|
+
<div class="meta">February 27, 2026 · 8 min read · Based on <a href="https://www.youtube.com/watch?v=g9LO9M1ZLIk" target="_blank">IBM Security Intelligence Podcast</a></div>
|
|
77
|
+
|
|
78
|
+
<p>Three of IBM's top security minds — an IBM Fellow, an X-Force Incident Command leader, and a Distinguished Engineer — sat down on the <em>Security Intelligence</em> podcast to discuss AI agent security. Their conclusions were sobering, specific, and directly relevant to anyone running an AI agent today.</p>
|
|
79
|
+
|
|
80
|
+
<p>We listened to the whole episode. Here are the risks they identified — and how ClawMoat addresses every single one.</p>
|
|
81
|
+
|
|
82
|
+
<div style="display:grid;gap:12px;margin:32px 0">
|
|
83
|
+
<div class="expert-card">
|
|
84
|
+
<div class="name">Sridhar Mupidi</div>
|
|
85
|
+
<div class="title">IBM Fellow & CTO, IBM Security</div>
|
|
86
|
+
</div>
|
|
87
|
+
<div class="expert-card">
|
|
88
|
+
<div class="name">Nick Bradley</div>
|
|
89
|
+
<div class="title">X-Force Incident Command, IBM Security</div>
|
|
90
|
+
</div>
|
|
91
|
+
<div class="expert-card">
|
|
92
|
+
<div class="name">Jeff Crume</div>
|
|
93
|
+
<div class="title">Distinguished Engineer & Master Inventor, AI and Data Security, IBM</div>
|
|
94
|
+
</div>
|
|
95
|
+
</div>
|
|
96
|
+
|
|
97
|
+
<!-- Risk 1 -->
|
|
98
|
+
<h2>1. "We're giving agents system-level privileges and turning them loose"</h2>
|
|
99
|
+
|
|
100
|
+
<blockquote>
|
|
101
|
+
<p>"You're going to turn that loose on your system and give it maybe system-level privileges so that it can modify files, enter terminal commands… This is something that is tremendously powerful if it's used well. But the fact of the matter is most people — this is going to be very opaque."</p>
|
|
102
|
+
<p class="attr">— Jeff Crume, IBM Distinguished Engineer</p>
|
|
103
|
+
</blockquote>
|
|
104
|
+
|
|
105
|
+
<p>Jeff nailed the core problem. AI agents aren't regular apps. They have shell access, file system access, and network access. Most users don't understand what they're granting when they install one.</p>
|
|
106
|
+
|
|
107
|
+
<div class="risk-box">
|
|
108
|
+
<div class="label">🔴 The Risk</div>
|
|
109
|
+
<p style="margin:0">An agent with unconstrained system access can read credentials, modify files, and execute arbitrary commands — all while the user thinks it's just "helping with code."</p>
|
|
110
|
+
</div>
|
|
111
|
+
|
|
112
|
+
<div class="fix-box">
|
|
113
|
+
<div class="label">🟢 ClawMoat's Answer</div>
|
|
114
|
+
<p style="margin:0"><strong>Host Guardian</strong> monitors file system access, credential exposure, and system-level operations in real time. <strong>Secret Scanner</strong> catches credentials before they leak through agent outputs. <strong>Network Egress Logger</strong> tracks every outbound connection the agent makes.</p>
|
|
115
|
+
</div>
|
|
116
|
+
|
|
117
|
+
<!-- Risk 2 -->
|
|
118
|
+
<h2>2. "Treat every agent like a privileged insider"</h2>
|
|
119
|
+
|
|
120
|
+
<blockquote>
|
|
121
|
+
<p>"Treat every agent like an insider or a privileged account. Whether it's open source or not, make sure they're only allowed to do what they're allowed to do — nothing more, nothing less."</p>
|
|
122
|
+
<p class="attr">— Sridhar Mupidi, IBM Fellow & CTO</p>
|
|
123
|
+
</blockquote>
|
|
124
|
+
|
|
125
|
+
<blockquote>
|
|
126
|
+
<p>"The principle of least privilege. We have to lock these things down, only give them access that is absolutely necessary, that we approve of, that we understand, and don't give it to them for any longer than is necessary."</p>
|
|
127
|
+
<p class="attr">— Jeff Crume, IBM Distinguished Engineer</p>
|
|
128
|
+
</blockquote>
|
|
129
|
+
|
|
130
|
+
<p>Both Sridhar and Jeff independently converged on the same point: least privilege isn't optional for agents. It's the single most important security principle in the agentic era.</p>
|
|
131
|
+
|
|
132
|
+
<div class="fix-box">
|
|
133
|
+
<div class="label">🟢 ClawMoat's Answer</div>
|
|
134
|
+
<p style="margin:0"><strong>McpFirewall</strong> enforces tool-level access control — define exactly which tools an agent can call and with what parameters. <strong>FinanceGuard</strong> applies domain-specific constraints (transaction limits, approved recipients) so agents can't exceed their authority even if compromised.</p>
|
|
135
|
+
</div>
|
|
136
|
+
|
|
137
|
+
<!-- Risk 3 -->
|
|
138
|
+
<h2>3. "It processed exactly what it was supposed to — and got busted"</h2>
|
|
139
|
+
|
|
140
|
+
<blockquote>
|
|
141
|
+
<p>"By the time you realize, it's too late and you run into situations like what happened with OpenClaw where it was running the direct prompt injections and it thought it wasn't doing anything wrong. It was processing exactly what it was supposed to, and you get busted."</p>
|
|
142
|
+
<p class="attr">— Nick Bradley, X-Force Incident Command</p>
|
|
143
|
+
</blockquote>
|
|
144
|
+
|
|
145
|
+
<p>Nick describes the fundamental nature of prompt injection: the agent can't tell the difference between legitimate instructions and malicious ones injected through data. It faithfully executes both.</p>
|
|
146
|
+
|
|
147
|
+
<div class="risk-box">
|
|
148
|
+
<div class="label">🔴 The Risk</div>
|
|
149
|
+
<p style="margin:0">Prompt injection through web pages, emails, documents, or inter-agent messages. The agent follows malicious instructions embedded in content it was asked to process.</p>
|
|
150
|
+
</div>
|
|
151
|
+
|
|
152
|
+
<div class="fix-box">
|
|
153
|
+
<div class="label">🟢 ClawMoat's Answer</div>
|
|
154
|
+
<p style="margin:0"><strong>Prompt Injection Scanner</strong> analyzes inputs using pattern matching and heuristic analysis across 10+ attack vectors — before they reach the model. Zero dependencies, no API calls, runs entirely locally. Catches injection attempts in web content, emails, and inter-agent messages.</p>
|
|
155
|
+
</div>
|
|
156
|
+
|
|
157
|
+
<!-- Risk 4 -->
|
|
158
|
+
<h2>4. "These are agents doing things for you based on very minimum supervision"</h2>
|
|
159
|
+
|
|
160
|
+
<blockquote>
|
|
161
|
+
<p>"The reality is that these are agents that are doing things for you based on very minimum supervision. And that's scary to me. That is scary in terms of how much you want to give them permission to do."</p>
|
|
162
|
+
<p class="attr">— Sridhar Mupidi, IBM Fellow & CTO</p>
|
|
163
|
+
</blockquote>
|
|
164
|
+
|
|
165
|
+
<p>Agents operate autonomously. That's the whole point. But autonomy without monitoring is just unsupervised code execution with extra steps.</p>
|
|
166
|
+
|
|
167
|
+
<div class="fix-box">
|
|
168
|
+
<div class="label">🟢 ClawMoat's Answer</div>
|
|
169
|
+
<p style="margin:0"><strong>Skill Integrity Checker</strong> verifies that agent skills haven't been tampered with — catching supply chain attacks before they execute. <strong>Network Egress Logger</strong> creates a full audit trail of every external connection. Every ClawMoat scanner produces structured alerts you can pipe to any monitoring system.</p>
|
|
170
|
+
</div>
|
|
171
|
+
|
|
172
|
+
<!-- Risk 5 -->
|
|
173
|
+
<h2>5. "Don't say no — say how"</h2>
|
|
174
|
+
|
|
175
|
+
<blockquote>
|
|
176
|
+
<p>"Don't say no, say how. If we just tell people don't do it, and we don't give them a sanctioned option, then they're just going to go do it in the bad way."</p>
|
|
177
|
+
<p class="attr">— Jeff Crume, IBM Distinguished Engineer</p>
|
|
178
|
+
</blockquote>
|
|
179
|
+
|
|
180
|
+
<blockquote>
|
|
181
|
+
<p>"Embrace that, give people a sanctioned option… provide things like OpenClaw or Claude with some more guardrails, some rules on which they can act."</p>
|
|
182
|
+
<p class="attr">— Sridhar Mupidi, IBM Fellow & CTO</p>
|
|
183
|
+
</blockquote>
|
|
184
|
+
|
|
185
|
+
<p>This is the argument for runtime security layers over outright bans. People are going to use AI agents regardless. The question is whether they do it with protection or without.</p>
|
|
186
|
+
|
|
187
|
+
<div class="fix-box">
|
|
188
|
+
<div class="label">🟢 ClawMoat's Answer</div>
|
|
189
|
+
<p style="margin:0">ClawMoat is the "how." It doesn't block agents — it makes them safe to run. One <code>npm install</code>, zero configuration required, and your agent has prompt injection scanning, secret detection, egress monitoring, and tool-level access control. <strong>Say yes to agents. Say yes with guardrails.</strong></p>
|
|
190
|
+
</div>
|
|
191
|
+
|
|
192
|
+
<!-- Risk 6 -->
|
|
193
|
+
<h2>6. "Security is the brakes that let you go fast"</h2>
|
|
194
|
+
|
|
195
|
+
<blockquote>
|
|
196
|
+
<p>"The question of why you put brakes on a car — the answer is not to stop, it's so you can go really fast. And the reason I know that's the case is: how fast would you drive a car that had no brakes? You wouldn't. So security is the brakes on the car that let you take calculated risk."</p>
|
|
197
|
+
<p class="attr">— Jeff Crume, IBM Distinguished Engineer</p>
|
|
198
|
+
</blockquote>
|
|
199
|
+
|
|
200
|
+
<p>This might be the single best framing of AI agent security we've heard. Security isn't the thing that slows you down — it's the thing that lets you go faster with confidence.</p>
|
|
201
|
+
|
|
202
|
+
<p>ClawMoat adds less than 2ms of latency per scan. It has zero dependencies. It runs entirely locally. These are brakes designed for a Formula One car, not a school bus.</p>
|
|
203
|
+
|
|
204
|
+
<!-- The bigger picture -->
|
|
205
|
+
<h2>The Pattern IBM Keeps Pointing To</h2>
|
|
206
|
+
|
|
207
|
+
<p>Across the entire conversation, three themes repeat:</p>
|
|
208
|
+
|
|
209
|
+
<ol>
|
|
210
|
+
<li><strong>Least privilege is non-negotiable.</strong> Every agent is a privileged insider. Constrain it accordingly.</li>
|
|
211
|
+
<li><strong>Monitoring must be continuous.</strong> Autonomy without observability is reckless.</li>
|
|
212
|
+
<li><strong>Banning agents doesn't work.</strong> Give people a secure way to use them, or they'll use them insecurely.</li>
|
|
213
|
+
</ol>
|
|
214
|
+
|
|
215
|
+
<p>These aren't hypothetical concerns from academics. These are the conclusions of IBM's CTO of Security, their X-Force incident response leader, and a Distinguished Engineer with decades of experience. They've seen what happens when organizations skip security for speed.</p>
|
|
216
|
+
|
|
217
|
+
<p>ClawMoat was built for exactly the world they're describing.</p>
|
|
218
|
+
|
|
219
|
+
<!-- CTA -->
|
|
220
|
+
<div class="cta">
|
|
221
|
+
<h3>🏰 Add Runtime Protection in 30 Seconds</h3>
|
|
222
|
+
<p>277 tests. Zero dependencies. MIT license. The guardrails IBM's experts say you need.</p>
|
|
223
|
+
<pre style="text-align:left;margin:16px auto;max-width:340px"><code>npm install clawmoat</code></pre>
|
|
224
|
+
<a href="https://github.com/darfaz/clawmoat">⭐ Star on GitHub</a>
|
|
225
|
+
</div>
|
|
226
|
+
|
|
227
|
+
<p style="text-align:center;font-size:.85rem;margin-top:40px">
|
|
228
|
+
Source: <a href="https://www.youtube.com/watch?v=g9LO9M1ZLIk" target="_blank">IBM Security Intelligence Podcast</a> · Quotes lightly edited for clarity
|
|
229
|
+
</p>
|
|
230
|
+
|
|
231
|
+
</div>
|
|
232
|
+
</article>
|
|
233
|
+
|
|
234
|
+
<footer style="border-top:1px solid rgba(255,255,255,.06);padding:32px 0;color:var(--gray);font-size:.85rem;text-align:center">
|
|
235
|
+
© 2026 ClawMoat. Built for the OpenClaw community. 🏰
|
|
236
|
+
</footer>
|
|
237
|
+
</body>
|
|
238
|
+
</html>
|
package/docs/blog/index.html
CHANGED
|
@@ -59,6 +59,174 @@ nav .container{display:flex;align-items:center;justify-content:space-between}
|
|
|
59
59
|
</div>
|
|
60
60
|
|
|
61
61
|
<div class="posts">
|
|
62
|
+
<div class="post-card" style="border-color:var(--emerald)">
|
|
63
|
+
<h2><a href="/blog/nist-ai-agent-standards-clawmoat.html">NIST Is Standardizing AI Agent Security — ClawMoat Already Ships It</a></h2>
|
|
64
|
+
<div class="post-meta">February 28, 2026 · 10 min read · <span style="color:var(--emerald)">NEW</span></div>
|
|
65
|
+
<p class="post-desc">On Feb 20, NIST launched the AI Agent Standards Initiative — the first federal effort to standardize agent security. Every concern they raised maps to a ClawMoat module that's already shipping: Host Guardian, McpFirewall, Prompt Injection Scanner, and more.</p>
|
|
66
|
+
<div class="tags">
|
|
67
|
+
<span class="tag">NIST</span>
|
|
68
|
+
<span class="tag">CAISI</span>
|
|
69
|
+
<span class="tag">standards</span>
|
|
70
|
+
<span class="tag">compliance</span>
|
|
71
|
+
</div>
|
|
72
|
+
</div>
|
|
73
|
+
|
|
74
|
+
<div class="post-card" style="border-color:var(--emerald)">
|
|
75
|
+
<h2><a href="/blog/openclaw-security-reckoning-2026.html">800 Malicious Plugins, 40K Exposed Instances: The OpenClaw Security Reckoning</a></h2>
|
|
76
|
+
<div class="post-meta">February 28, 2026 · 12 min read · <span style="color:var(--emerald)">NEW</span></div>
|
|
77
|
+
<p class="post-desc">CVE-2026-25253 triggered 6+ articles in 48 hours from Dark Reading, CyberExpress, EMSI, and more. 800+ malicious plugins (~20% of registry). The agent security crisis went mainstream — here's what they're saying and how ClawMoat addresses every attack vector.</p>
|
|
78
|
+
<div class="tags">
|
|
79
|
+
<span class="tag">CVE-2026-25253</span>
|
|
80
|
+
<span class="tag">supply-chain</span>
|
|
81
|
+
<span class="tag">reckoning</span>
|
|
82
|
+
<span class="tag">runtime-security</span>
|
|
83
|
+
</div>
|
|
84
|
+
</div>
|
|
85
|
+
|
|
86
|
+
<div class="post-card">
|
|
87
|
+
<h2><a href="/blog/mcp-30-cves-security-crisis.html">30 CVEs and Counting: The MCP Security Crisis Nobody's Talking About</a></h2>
|
|
88
|
+
<div class="post-meta">February 28, 2026 · 10 min read · <span style="color:var(--emerald)">NEW</span></div>
|
|
89
|
+
<p class="post-desc">MCP has hit 30 CVEs. 36% of servers have zero auth. A fresh Go SDK bypass (CVE-2026-27896) dropped yesterday. Here's the 3-layer attack surface — and how McpFirewall intercepts every tool call with 29 write patterns, field-level redaction, and rate limiting.</p>
|
|
90
|
+
<div class="tags">
|
|
91
|
+
<span class="tag">MCP</span>
|
|
92
|
+
<span class="tag">CVE</span>
|
|
93
|
+
<span class="tag">McpFirewall</span>
|
|
94
|
+
<span class="tag">financial-security</span>
|
|
95
|
+
</div>
|
|
96
|
+
</div>
|
|
97
|
+
|
|
98
|
+
<div class="post-card">
|
|
99
|
+
<h2><a href="/blog/ibm-experts-agent-runtime-protection.html">IBM's AI Security Experts Agree: Your Agent Needs Runtime Protection</a></h2>
|
|
100
|
+
<div class="post-meta">February 27, 2026 · 8 min read</div>
|
|
101
|
+
<p class="post-desc">Three IBM security leaders — an IBM Fellow, an X-Force commander, and a Distinguished Engineer — explain why AI agents need runtime guardrails. Their concerns map directly to ClawMoat's protection layers.</p>
|
|
102
|
+
<div class="tags">
|
|
103
|
+
<span class="tag">IBM</span>
|
|
104
|
+
<span class="tag">expert-analysis</span>
|
|
105
|
+
<span class="tag">runtime-security</span>
|
|
106
|
+
<span class="tag">least-privilege</span>
|
|
107
|
+
</div>
|
|
108
|
+
</div>
|
|
109
|
+
|
|
110
|
+
<div class="post-card">
|
|
111
|
+
<h2><a href="/blog/386-malicious-skills.html">386 Malicious Skills: How ClawMoat's Skill Audit Would Have Caught Them</a></h2>
|
|
112
|
+
<div class="post-meta">February 27, 2026 · 8 min read · <span style="color:var(--emerald)">NEW</span></div>
|
|
113
|
+
<p class="post-desc">386 malicious OpenClaw skills found in the wild. Here's exactly what they do, the 19 patterns ClawMoat's supply-chain scanner detects, and how to audit your installed skills in under 2 seconds.</p>
|
|
114
|
+
<div class="tags">
|
|
115
|
+
<span class="tag">supply-chain</span>
|
|
116
|
+
<span class="tag">skills</span>
|
|
117
|
+
<span class="tag">malware</span>
|
|
118
|
+
<span class="tag">scanner</span>
|
|
119
|
+
</div>
|
|
120
|
+
</div>
|
|
121
|
+
|
|
122
|
+
<div class="post-card">
|
|
123
|
+
<h2><a href="/blog/ollama-openclaw-security.html">Ollama Just Made OpenClaw One-Click. Here's How to Secure It.</a></h2>
|
|
124
|
+
<div class="post-meta">February 27, 2026 · 5 min read</div>
|
|
125
|
+
<p class="post-desc">Ollama 0.17 ships native OpenClaw integration with web search. Great for adoption — terrifying for security. Local models don't fix host-level vulnerabilities. Here's how to lock it down.</p>
|
|
126
|
+
<div class="tags">
|
|
127
|
+
<span class="tag">Ollama</span>
|
|
128
|
+
<span class="tag">local-models</span>
|
|
129
|
+
<span class="tag">one-click</span>
|
|
130
|
+
<span class="tag">v0.8.0</span>
|
|
131
|
+
</div>
|
|
132
|
+
</div>
|
|
133
|
+
|
|
134
|
+
<div class="post-card">
|
|
135
|
+
<h2><a href="/blog/oasis-websocket-hijack.html">Any Website Can Hijack Your OpenClaw Agent — and ClawMoat Now Detects It</a></h2>
|
|
136
|
+
<div class="post-meta">February 27, 2026 · 8 min read · <span style="color:var(--emerald)">NEW — v0.7.1</span></div>
|
|
137
|
+
<p class="post-desc">Oasis Security found a zero-click attack: any website can take full control of your OpenClaw agent via WebSocket. We shipped GatewayMonitor in v0.7.1 — brute-force detection, suspicious origin alerts, device pairing monitoring, and gateway config audit.</p>
|
|
138
|
+
<div class="tags">
|
|
139
|
+
<span class="tag">CVE</span>
|
|
140
|
+
<span class="tag">WebSocket</span>
|
|
141
|
+
<span class="tag">zero-click</span>
|
|
142
|
+
<span class="tag">v0.7.1</span>
|
|
143
|
+
</div>
|
|
144
|
+
</div>
|
|
145
|
+
|
|
146
|
+
<div class="post-card">
|
|
147
|
+
<h2><a href="/blog/40000-exposed-openclaw-instances.html">40,000 Exposed OpenClaw Instances — and 6 New CVEs This Week</a></h2>
|
|
148
|
+
<div class="post-meta">February 27, 2026 · 7 min read</div>
|
|
149
|
+
<p class="post-desc">SecurityScorecard found 40,000+ misconfigured OpenClaw instances exposed to the internet. 63% are vulnerable. Endor Labs disclosed 6 new CVEs. Here's what happened and how to protect your deployment.</p>
|
|
150
|
+
<div class="tags">
|
|
151
|
+
<span class="tag">CVE</span>
|
|
152
|
+
<span class="tag">SecurityScorecard</span>
|
|
153
|
+
<span class="tag">exposure</span>
|
|
154
|
+
<span class="tag">defense-in-depth</span>
|
|
155
|
+
</div>
|
|
156
|
+
</div>
|
|
157
|
+
|
|
158
|
+
<div class="post-card">
|
|
159
|
+
<h2><a href="/blog/agent-trust-protocol.html">Why Your AI Agent Needs a Trust Badge — The Case for Agent-to-Agent Security</a></h2>
|
|
160
|
+
<div class="post-meta">February 26, 2026 · 7 min read</div>
|
|
161
|
+
<p class="post-desc">101K agents on Moltbook. Zero trust signals between them. We're building a trust protocol for the agent economy — verification badges, attestations, and agent-to-agent security handshakes. Built on ClawMoat's inter-agent message scanning.</p>
|
|
162
|
+
<div class="tags">
|
|
163
|
+
<span class="tag">trust-protocol</span>
|
|
164
|
+
<span class="tag">moltbook</span>
|
|
165
|
+
<span class="tag">agent-economy</span>
|
|
166
|
+
<span class="tag">inter-agent</span>
|
|
167
|
+
</div>
|
|
168
|
+
</div>
|
|
169
|
+
|
|
170
|
+
<div class="post-card">
|
|
171
|
+
<h2><a href="/blog/openclaw-enterprise-readiness-claw10.html">OpenClaw Scores 1.2/5 for Enterprise Readiness. Here's How to Fix 4 of the 10 Gaps.</a></h2>
|
|
172
|
+
<div class="post-meta">February 26, 2026 · 6 min read</div>
|
|
173
|
+
<p class="post-desc">Onyx AI's CLAW-10 framework scored OpenClaw 1.2/5 for enterprise readiness. ClawMoat directly addresses 4 of the 10 gaps: authorization, audit logging, privilege model, and supply chain security. Full mapping inside.</p>
|
|
174
|
+
<div class="tags">
|
|
175
|
+
<span class="tag">enterprise</span>
|
|
176
|
+
<span class="tag">CLAW-10</span>
|
|
177
|
+
<span class="tag">compliance</span>
|
|
178
|
+
<span class="tag">framework</span>
|
|
179
|
+
</div>
|
|
180
|
+
</div>
|
|
181
|
+
|
|
182
|
+
<div class="post-card">
|
|
183
|
+
<h2><a href="/blog/microsoft-openclaw-workstation-security.html">Microsoft Says Don't Run OpenClaw on Your Workstation. Here's How to Do It Safely.</a></h2>
|
|
184
|
+
<div class="post-meta">February 26, 2026 · 8 min read</div>
|
|
185
|
+
<p class="post-desc">Microsoft's security team says OpenClaw is "untrusted code execution with persistent credentials." They recommend dedicated VMs. We built a better answer: host-level security that makes your workstation safe — without a VM.</p>
|
|
186
|
+
<div class="tags">
|
|
187
|
+
<span class="tag">microsoft</span>
|
|
188
|
+
<span class="tag">enterprise</span>
|
|
189
|
+
<span class="tag">host-security</span>
|
|
190
|
+
<span class="tag">openclaw</span>
|
|
191
|
+
</div>
|
|
192
|
+
</div>
|
|
193
|
+
|
|
194
|
+
<div class="post-card">
|
|
195
|
+
<h2><a href="/blog/clawmoat-vs-llamafirewall-nemo-guardrails.html">ClawMoat vs LlamaFirewall vs NeMo Guardrails: Which AI Agent Security Tool?</a></h2>
|
|
196
|
+
<div class="post-meta">February 25, 2026 · 8 min read</div>
|
|
197
|
+
<p class="post-desc">Three open-source projects, three different approaches. LlamaFirewall protects the model. NeMo Guardrails protects conversations. ClawMoat protects the host. Here's how to choose — and why you might need all three.</p>
|
|
198
|
+
<div class="tags">
|
|
199
|
+
<span class="tag">comparison</span>
|
|
200
|
+
<span class="tag">security</span>
|
|
201
|
+
<span class="tag">opensource</span>
|
|
202
|
+
<span class="tag">ai-agents</span>
|
|
203
|
+
</div>
|
|
204
|
+
</div>
|
|
205
|
+
|
|
206
|
+
<div class="post-card">
|
|
207
|
+
<h2><a href="/blog/supply-chain-agents.html">Your AI Agent Just Got a Dependabot Email. Should It Click the Link?</a></h2>
|
|
208
|
+
<div class="post-meta">February 19, 2026 · 5 min read</div>
|
|
209
|
+
<p class="post-desc">A real CVE-2026-26960 alert exposed the gap between human instinct and AI agent obedience. Supply chain attacks are about to get a lot more dangerous when your AI agent blindly runs npm audit fix. Here's how ClawMoat catches it.</p>
|
|
210
|
+
<div class="tags">
|
|
211
|
+
<span class="tag">supply-chain</span>
|
|
212
|
+
<span class="tag">ai-agents</span>
|
|
213
|
+
<span class="tag">security</span>
|
|
214
|
+
<span class="tag">CVE</span>
|
|
215
|
+
</div>
|
|
216
|
+
</div>
|
|
217
|
+
|
|
218
|
+
<div class="post-card">
|
|
219
|
+
<h2><a href="/blog/v050-trust-layer.html">v0.5.0: The Trust Layer for AI Agents, Wherever They Run</a></h2>
|
|
220
|
+
<div class="post-meta">February 19, 2026 · 3 min read</div>
|
|
221
|
+
<p class="post-desc">ClawMoat v0.5.0 goes beyond laptop security. Credential file monitoring, skill integrity checking, network egress logging, inter-agent message scanning (10 attack patterns), and a full alert delivery system. Informed by research from Cisco, Snyk, SecurityScorecard, and Permiso — because 13.4% of ClawHub skills have critical issues and 135K instances are exposed. 128 tests, zero dependencies.</p>
|
|
222
|
+
<div class="tags">
|
|
223
|
+
<span class="tag">release</span>
|
|
224
|
+
<span class="tag">v0.5.0</span>
|
|
225
|
+
<span class="tag">security</span>
|
|
226
|
+
<span class="tag">inter-agent</span>
|
|
227
|
+
</div>
|
|
228
|
+
</div>
|
|
229
|
+
|
|
62
230
|
<div class="post-card">
|
|
63
231
|
<h2><a href="/blog/securing-ai-agents.html">Your AI Agent Has Shell Access. Here's How to Secure It.</a></h2>
|
|
64
232
|
<div class="post-meta">February 13, 2026 · 4 min read</div>
|