Protocol AuditActive security review

We ran a 2-week active audit on your protocol and found 2 critical issues.

Most AI protocols ship fast and discover their security gaps the hard way — during an incident. We run systematic active audits on your OpenClaw agent infrastructure: inter-agent channels, tool permissions, session handling, and prompt injection surfaces. You get a findings report with PoCs and explicit fix instructions before your users find the holes first.

🔍

Active audit

2-Week Engagement

Critical findings2
High-risk findings3
Medium findings2
Low-risk findings1
Remediation steps8

Sample output only

Every audit is scoped to your protocol. Findings vary based on your agent architecture and threat model.

What we examine

We don't just look at the surface. We test the full attack surface of your agent system.

Inter-agent message bus security
Tool call privilege boundaries
Session token lifecycle & rotation
Prompt injection resistance
Agent privilege escalation paths
Secret handling in agent context
Rate limiting & DoS surfaces
Agent decision audit trails
Failure mode behavior
External API call attribution
Sub-agent isolation
Heartbeat & control channel integrity

How it works

4-week engagement

Day 1

01

Scope + Kickoff

We agree on protocol boundaries, agent roles, and the threat model. You hand over read-only access. We sign an NDA before touching anything.

Days 2–15

02

Active Audit (14 days)

We run systematic tests across every agent, tool, and inter-agent channel. We probe privilege boundaries, injection vectors, session handling, and failure modes.

Day 16

03

Findings Report

A structured report with severity ratings, PoC reproduction steps, and explicit remediation guidance for each finding. Delivered as a ranked markdown doc + live walkthrough.

Week 3–4

04

Remediation Support (optional)

We implement the fixes directly, or work with your engineering team to validate their patches. Your choice.

Sample output

What the findings report looks like

Every finding includes severity, description, proof of concept, and explicit remediation steps your team can act on immediately.

Critical

Agent privilege escalation paths

Agents configured with overbroad permissions can invoke actions outside their intended scope — including wallet moves, secret reads, and external API calls.

Remediation

Scoped IAM policies + mandatory approval gates on high-risk tool calls.

Critical

Unauthenticated inter-agent message bus

Internal agent-to-agent communication carries no message-level authentication. A compromised agent can spoof messages to other agents at will.

Remediation

Signed message envelopes + mutual TLS on the internal bus.

High

Long-lived session tokens without rotation

Agent sessions persist for days. Token theft via log exposure or a compromised sub-agent grants indefinite access.

Remediation

Short-lived JWTs (≤1hr) + automatic rotation via the OpenClaw auth layer.

High

Unbounded tool call loops

Recursive agent loops have no hard cap. Under adversarial prompt conditions, agents can spin indefinitely — racking up compute cost and locking other agents out.

Remediation

Depth/gas limits + circuit breakers per agent role.

High

Secrets injected into agent context unredacted

API keys and credentials appear in full in agent working memory, tool logs, and session transcripts — exposing them to any agent with read access.

Remediation

Secret masking at the tool layer + per-agent secret scoping.

Medium

No audit trail for agent decisions

Agent actions are not logged with sufficient granularity to reconstruct decision chains during an incident.

Remediation

Structured agent event log with causal chain tracing.

Medium

Missing rate-limit attribution

Downstream API rate limits hit without per-agent attribution make it impossible to identify the offending agent quickly.

Remediation

Per-agent request counters + automatic backpressure signaling.

Low

Default agent naming + no agent identity hierarchy

Agents named generically make audit logs and permission traces harder to read under pressure.

Remediation

Canonical naming schema + identity hierarchy in the agent manifest.

Starter

Single protocol

$1,499

For protocols with a single agent or 2–3 agents sharing a simple toolchain.

  • 14-day active audit
  • Up to 5 agents
  • Written findings report
  • Remediation guide
  • 1 live walkthrough call
Request audit

Standard

Multi-agent protocol

$2,999

For protocols with complex inter-agent communication and multiple tool chains.

  • 14-day active audit
  • Up to 15 agents
  • Full findings report with PoCs
  • Remediation guide + code snippets
  • 3 live walkthrough calls
  • 60-day email support
Request audit

Enterprise

Full infrastructure

Custom

For protocols with custom auth, external integrations, and hardened security requirements.

  • Custom scope + timeline
  • Unlimited agents
  • Red team option available
  • On-site or remote
  • Direct Slack escalation channel
  • Remediation sprint support
Contact us

Get started

Ready to find out what's actually running?

Tell us about your protocol. We'll scope the engagement, confirm timelines, and send a proposal within 24 hours.

Or email us directly at hello@openclawlaunchpad.com