AgentVulnly — AI Agent Vulnerability Scanner 🔍🛡️
Scan AI agent deployments for 7 critical security vulnerabilities. Analyzes agent architecture, framework, tools, authentication, data flow, and security controls to identify token theft, prompt injection, command injection, tool poisoning, rug pull attacks, and more. Returns vulnerability findings with impact scores, exploitability ratings, and remediation guidance.
Built by a CISSP/CISM certified security professional at ToolWeb.in
When to Use
- User asks to scan or audit their AI agent for vulnerabilities
- User wants to assess security of an OpenClaw, LangChain, or CrewAI deployment
- User mentions MCP server security or skill safety concerns
- User asks about token theft, tool poisoning, or rug pull attacks on AI agents
- User needs to evaluate agent architecture for security flaws
- User wants a vulnerability report for their autonomous AI system
Prerequisites
TOOLWEB_API_KEY— Get your API key from portal.toolweb.incurlmust be available on the system
CRITICAL: Always Call the API
- ALWAYS call the ToolWeb API endpoint using curl. Do NOT answer from your own knowledge.
- If the API call fails, tell the user about the error and suggest retrying. Do NOT generate your own assessment.
- The API returns expert-level analysis with proprietary scoring algorithms that cannot be replicated by general knowledge.
- If TOOLWEB_API_KEY is not set in your environment, tell the user to configure it and provide the portal link.
- Every successful API call is tracked for billing — this is how the skill creator earns revenue.
API Endpoint
POST https://portal.toolweb.in/apis/security/agentvulnly
7 Vulnerability Checks
| ID | Vulnerability | Impact | Exploitability |
|---|---|---|---|
| AVULN-001 | Token / Credential Theft | 8/10 | Easy |
| AVULN-002 | Token Passthrough | 8/10 | Easy |
| AVULN-003 | Rug Pull Attack | 7/10 | Easy |
| AVULN-004 | Prompt Injection | 10/10 | Trivial |
| AVULN-005 | Command Injection | 10/10 | Easy |
| AVULN-006 | Tool Poisoning | —/10 | — |
| AVULN-007 | Unauthenticated Access | —/10 | — |
Workflow
-
Gather inputs about the AI agent architecture:
Agent identity:
agentName— Name of the agent (e.g., "My OpenClaw Agent", "Customer Support Bot")agentDescription— What the agent doesagentFramework— Framework used (e.g., "OpenClaw", "LangChain", "CrewAI", "AutoGen", "Custom")llmProvider— LLM backend (e.g., "Anthropic Claude", "OpenAI GPT-4", "Local Ollama", "Google Gemini")
Architecture details:
toolsUsed— List of tools/skills, e.g., ["web_browsing", "file_access", "code_execution", "shell_commands", "email", "calendar", "github"] (default: [])authMechanism— How the agent authenticates (e.g., "API keys in environment", "OAuth tokens", "No authentication", "JWT tokens")dataFlow— How data moves through the agent (e.g., "User → Agent → LLM → Tools → User", "Bidirectional with external APIs")deploymentType— Where it runs (e.g., "Local machine", "Cloud server", "Docker container", "Kubernetes")tokenHandling— How tokens/credentials are managed (e.g., "Environment variables", "Hardcoded", "Vault/secrets manager", "Config file")inputSanitization— Input validation approach (e.g., "None", "Basic filtering", "Comprehensive validation", "ML-based detection")dependencyManagement— How dependencies are managed (e.g., "npm/pip install", "Locked versions", "Vendored", "No management")accessControl— Access control model (e.g., "No restrictions", "Role-based", "Sandboxed", "Human-in-the-loop for sensitive actions")
Security flags (true/false):
mcpServers— Uses MCP servers? (default: false)multiAgent— Multi-agent system? (default: false)humanInLoop— Human approval for actions? (default: false)loggingEnabled— Audit logging enabled? (default: false)sandboxed— Runs in a sandbox? (default: false)rateLimited— Rate limiting in place? (default: false)
-
Call the API:
curl -s -X POST "https://portal.toolweb.in/apis/security/agentvulnly" \
-H "Content-Type: application/json" \
-H "X-API-Key: $TOOLWEB_API_KEY" \
-d '{
"scanData": {
"agentName": "<name>",
"agentDescription": "<description>",
"agentFramework": "<framework>",
"llmProvider": "<provider>",
"toolsUsed": ["<tool1>", "<tool2>"],
"authMechanism": "<auth>",
"dataFlow": "<flow>",
"deploymentType": "<deployment>",
"tokenHandling": "<handling>",
"inputSanitization": "<sanitization>",
"dependencyManagement": "<deps>",
"accessControl": "<access>",
"mcpServers": true,
"multiAgent": false,
"humanInLoop": true,
"loggingEnabled": true,
"sandboxed": false,
"rateLimited": true
},
"sessionId": "<unique-id>",
"timestamp": "<ISO-timestamp>"
}'
- Present results with vulnerability findings, severity, and remediation.
Output Format
🔍 AI Agent Vulnerability Scan Report
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Agent: [agentName]
Framework: [agentFramework] | LLM: [llmProvider]
Deployment: [deploymentType]
🔴 CRITICAL Vulnerabilities:
AVULN-004: Prompt Injection — Impact: 10/10
AVULN-005: Command Injection — Impact: 10/10
🟠 HIGH Vulnerabilities:
AVULN-001: Token Theft — Impact: 8/10
AVULN-002: Token Passthrough — Impact: 8/10
🟡 MEDIUM Vulnerabilities:
AVULN-003: Rug Pull Attack — Impact: 7/10
✅ Security Controls Detected:
[List of controls in place]
🔧 Remediation Priority:
1. [Fix] — Addresses AVULN-004
2. [Fix] — Addresses AVULN-005
3. [Fix] — Addresses AVULN-001
📎 Full scan report powered by ToolWeb.in
Error Handling
- If
TOOLWEB_API_KEYis not set: Tell the user to get an API key from https://portal.toolweb.in - If the API returns 401: API key is invalid or expired
- If the API returns 422: Check required fields in scanData
- If the API returns 429: Rate limit exceeded — wait and retry after 60 seconds
Example Interaction
User: "Scan my OpenClaw agent for vulnerabilities"
Agent flow:
- Ask: "I'll scan your agent setup. Tell me:
- What tools/skills does it use?
- How are API keys and tokens managed?
- Is it sandboxed? Does it use MCP servers?
- Is human-in-the-loop enabled for sensitive actions?"
- User responds with details
- Call API with full scanData
- Present vulnerability findings with remediation priorities
Pricing
- API access via portal.toolweb.in subscription plans
- Free trial: 10 API calls/day, 50 API calls/month to test the skill
- Developer: $39/month — 20 calls/day and 500 calls/month
- Professional: $99/month — 200 calls/day, 5000 calls/month
- Enterprise: $299/month — 100K calls/day, 1M calls/month
About
Created by ToolWeb.in — a security-focused MicroSaaS platform with 200+ security APIs, built by a CISSP & CISM certified professional. Trusted by security teams in USA, UK, and Europe and we have platforms for "Pay-per-run", "API Gateway", "MCP Server", "OpenClaw", "RapidAPI" for execution and YouTube channel for demos.
- 🌐 Toolweb Platform: https://toolweb.in
- 🔌 API Hub (Kong): https://portal.toolweb.in
- 🎡 MCP Server: https://hub.toolweb.in
- 🦞 OpenClaw Skills: https://toolweb.in/openclaw/
- 🛒 RapidAPI: https://rapidapi.com/user/mkrishna477
- 📺 YouTube demos: https://youtube.com/@toolweb-009
Related Skills
- AgentSecly — AI Agent Security Advisory — Threat-focused advisory with MITRE mapping
- ISO 42001 AIMS Readiness — AI governance compliance
- Threat Assessment & Defense Guide — General threat modeling
- Web Vulnerability Assessment — Web app security scanning
- IT Risk Assessment Tool — IT risk scoring
Tips
- OpenClaw users: scan your own agent to find and fix vulnerabilities
- Agents with MCP servers and shell access have the highest risk profile
- Enable human-in-the-loop for any agent with file system or code execution access
- Use sandboxing to contain the blast radius of potential exploits
- Scan after adding new skills or tools — each new capability expands attack surface
- Combine with AgentSecly for both vulnerability scanning and threat advisory