Agent workflow security
CLAW and OpenClaw security scanning
Review agent skills and workflow repositories for practical security concerns before installation, publishing, or reuse.
Why skill scanning matters
Agent skills can touch files, accounts, scripts, and network resources. Security review should happen before trust is granted.
- Secrets and tokens
- Dependency risk
- Risky automation
- Unexpected network behavior
- Permission review
Security references
CyberLens AI guidance is informed by established security standards and public vulnerability intelligence.
- OWASP Top 10: Common web application security risks used as a baseline reference.
- OWASP Application Security Verification Standard: Application security verification guidance for web application controls.
- NIST Cybersecurity Framework: Cybersecurity risk management guidance from NIST.
- CISA Known Exploited Vulnerabilities Catalog: Known exploited vulnerability intelligence for prioritization context.