Rajiv Ayyangar

ClawSecure - The AI-Powered Antivirus for AI Agents

ClawSecure is the AI-powered antivirus for AI agents. Pre-install scanning, real-time runtime monitoring, an in-agent Security Companion Agent, and a sub-200ms Verification API. Full 10/10 OWASP ASI coverage. 41% of top agents are dangerous. Free, no signup. clawsecure.ai

Add a comment

Replies

Best
Anushka Mittal

The security problem here is genuinely scary especially when agents already have system-level access by default. But it also creates an interesting trust paradox: the tool protecting me needs deep visibility into the same environment I’m trying to secure. Curious how ClawSecure approaches that trust layer for users beyond just ‘trust us’ especially for people running sensitive workflows locally.

J.D. Salbego

@anushkaamittal Smart question and it's one we took seriously from day one. The privacy boundary is architectural, not policy. Our runtime daemon transmits metadata only: component names, hashes, permission declarations, configuration structure, and behavioral telemetry. Credentials, source code, API keys, tokens, and conversation content never leave your machine. We also practice what we preach on our own platform: CSA STAR, OWASP ZAP tested, Aikido Security continuous scanning, Mozilla Observatory B+, published vulnerability disclosure policy with safe harbor. Everything is verifiable at clawsecure.ai/trust. The answer isn't "trust us." It's "verify us."

Sujal Gupta

The stat that 1 in 5 agent skills are exfiltrating data is alarming but also makes complete sense, most people install community skills the same way they install npm packages without reading the source. does the watchtower monitoring catch exfiltration attempts in real time or is it a post-run audit, because the difference matters a lot when the agent already has write access to your tools?

J.D. Salbego

@sujal_gupta12 Watchtower monitors continuously, not post-run. It detects code changes via hash comparison and triggers automatic rescans the moment drift is detected, so a skill that introduces exfiltration patterns after install gets flagged and rescored in real time. Beyond that, our AI-powered runtime monitoring analyzes behavioral telemetry across your entire agent environment continuously, including tool call patterns and anomalous activity, so you're not waiting for a report after the damage is done. When agents have write access to your tools, the detection has to be live. That's how we built it.

Divyanshu

Most security tools for agents focus on what the agent does..but who audits what data the agent sees before it even acts? Curious if ClawSecure covers data minimization at the input layer, not just threat detection at the output.

J.D. Salbego

@divyanshu17 Great question. Pre-install, our engine analyzes what data surfaces a skill is attempting to access and whether those access patterns are justified by what the skill claims to do. A skill declaring it needs clipboard access for a code formatting task but also reaching into MEMORY.md and making outbound requests to external endpoints gets flagged because the data access doesn't match the declared intent. Post-install, runtime monitoring maps the full permission surface and blast radius of your entire agent environment, showing exactly what each component can reach, so you have visibility into the data exposure layer, not just the threat detection layer.

Kumar Abhishek

Do you plan to open source the audit methodologies for transparency??

J.D. Salbego

@zerotox We open-source the research, not the detection rules. Our public GitHub repo has full OWASP ASI mapping, findings methodology, and security documentation. We also publish a Trust Center, vulnerability disclosure policy with safe harbor, NIST AI RMF alignment, and our CSA STAR Registry listing. Transparency of methodology and results is something we take seriously.

But the proprietary detection signatures and behavioral analysis logic stay closed, and that's intentional. Publishing the exact patterns our engine uses to catch threats would give malicious skill authors a blueprint to craft evasions. That's the same reason every serious security company keeps detection logic proprietary while making their tools widely accessible. Our scanner is free with zero restrictions. The research is public. The detection engine that keeps users safe stays protected.