← All skills
Tencent SkillHub · Developer Tools

agent-bom

AI supply chain security scanner — check packages for CVEs, look up MCP servers in the threat registry, assess blast radius, generate SBOMs, enforce compliance

skill openclawclawhub Free
0 Downloads
0 Stars
0 Installs
0 Score
High Signal

AI supply chain security scanner — check packages for CVEs, look up MCP servers in the threat registry, assess blast radius, generate SBOMs, enforce compliance

⬇ 0 downloads ★ 0 stars Unverified but indexed

Install for OpenClaw

Quick setup
  1. Download the package from Yavira.
  2. Extract the archive and review SKILL.md first.
  3. Import or place the package into your OpenClaw setup.

Requirements

Target platform
OpenClaw
Install method
Manual import
Extraction
Extract archive
Prerequisites
OpenClaw
Primary doc
SKILL.md

Package facts

Download mode
Yavira redirect
Package format
ZIP package
Source platform
Tencent SkillHub
What's included
SKILL.md, compliance/SKILL.md, scan/SKILL.md, registry/SKILL.md, runtime/SKILL.md

Validation

  • Use the Yavira download entry.
  • Review SKILL.md after the package is downloaded.
  • Confirm the extracted package contains the expected setup assets.

Install with your agent

Agent handoff

Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.

  1. Download the package from Yavira.
  2. Extract it into a folder your agent can access.
  3. Paste one of the prompts below and point your agent at the extracted folder.
New install

I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.

Upgrade existing

I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.

Trust & source

Release facts

Source
Tencent SkillHub
Verification
Indexed source record
Version
0.71.0

Documentation

ClawHub primary doc Primary doc: SKILL.md 14 sections Open source page

agent-bom — AI Agent Infrastructure Security Scanner

Discovers MCP clients and servers across 22 AI tools, scans for CVEs, maps blast radius, runs cloud CIS benchmarks, checks OWASP/NIST/MITRE compliance, generates SBOMs, and assesses AI infrastructure against AISVS v1.0 and MAESTRO framework layers.

Install

pipx install agent-bom agent-bom scan # auto-discover + scan agent-bom check langchain # check a specific package agent-bom fs . # scan filesystem packages agent-bom image nginx:1.25 # scan container image (native, no Syft) agent-bom cloud aws # AWS CIS benchmark agent-bom iac infra/ # scan Terraform/CloudFormation agent-bom where # show all discovery paths

As an MCP Server

{ "mcpServers": { "agent-bom": { "command": "uvx", "args": ["agent-bom", "mcp"] } } }

Vulnerability Scanning

ToolDescriptionscanFull discovery + vulnerability scan pipelinecheckCheck a package for CVEs (OSV, NVD, EPSS, KEV)blast_radiusMap CVE impact chain across agents, servers, credentialsremediatePrioritized remediation plan for vulnerabilitiesverifyPackage integrity + SLSA provenance checkdiffCompare two scan reports (new/resolved/persistent)whereShow MCP client config discovery pathsinventoryList discovered agents, servers, packages

Compliance & Policy

ToolDescriptioncomplianceOWASP LLM/Agentic Top 10, EU AI Act, MITRE ATLAS, NIST AI RMFpolicy_checkEvaluate results against custom security policy (17 conditions)cis_benchmarkCIS benchmark checks (AWS, Azure v3.0, GCP v3.0, Snowflake)generate_sbomGenerate SBOM (CycloneDX or SPDX format)aisvs_benchmarkOWASP AISVS v1.0 compliance — 9 AI security checks

Registry & Trust

ToolDescriptionregistry_lookupLook up MCP server in 427+ server security metadata registrymarketplace_checkPre-install trust check with registry cross-referencefleet_scanBatch registry lookup + risk scoring for MCP server inventoriesskill_trustAssess skill file trust level (5-category analysis)code_scanSAST scanning via Semgrep with CWE-based compliance mapping

Runtime & Analytics

ToolDescriptioncontext_graphAgent context graph with lateral movement analysisanalytics_queryQuery vulnerability trends, posture history, and runtime eventsruntime_correlateCross-reference proxy audit JSONL with CVE findings, risk amplificationvector_db_scanProbe Qdrant/Weaviate/Chroma/Milvus for auth and exposuregpu_infra_scanGPU container and K8s node inventory + unauthenticated DCGM probe (MAESTRO KC6)

Specialized Scans

ToolDescriptiondataset_card_scanScan dataset cards for bias, licensing, and provenance issuestraining_pipeline_scanScan training pipeline configs for security risksbrowser_extension_scanScan browser extensions for risky permissions and AI domain accessmodel_provenance_scanVerify model provenance and supply chain integrityprompt_scanScan prompt templates for injection and data leakage risksmodel_file_scanScan model files for unsafe serialization (pickle, etc.)license_compliance_scanFull SPDX license catalog scan with copyleft and network-copyleft detectioningest_external_scanImport Trivy/Grype/Syft scan results and merge into agent-bom findings

Resources

ResourceDescriptionregistry://serversBrowse 427+ MCP server security metadata registry

Example Workflows

# Check a package before installing check(package="@modelcontextprotocol/server-filesystem", ecosystem="npm") # Map blast radius of a CVE blast_radius(cve_id="CVE-2024-21538") # Full scan scan() # Run CIS benchmark cis_benchmark(provider="aws") # Run AISVS v1.0 compliance aisvs_benchmark() # Scan vector databases for auth misconfigurations vector_db_scan() # Discover GPU containers, K8s GPU nodes, and unauthenticated DCGM endpoints gpu_infra_scan() # Assess trust of a skill file skill_trust(skill_content="<paste SKILL.md content>")

Guardrails

Always do: Show CVEs even when NVD analysis is pending or severity is unknown — a CVE ID with no details is still a real finding. Report what is known; mark severity as unknown explicitly. Confirm with the user before scanning cloud environments (cis_benchmark) — these make live API calls to AWS/Azure/GCP using the user's credentials. Treat UNKNOWN severity as unresolved, not benign — it means data is not yet available, not that the issue is minor. Never do: Do not modify any files, install packages, or change system configuration. This skill is read-only. Do not transmit env var values, credentials, or file contents to any external service. Only package names and CVE IDs leave the machine. Do not invoke scan() autonomously on sensitive environments without user confirmation. The autonomous_invocation policy is restricted. Stop and ask the user when: The user requests a cloud CIS benchmark and no cloud credentials are configured. A scan finds CRITICAL CVEs — present findings and ask whether to generate a remediation plan. The user asks to scan a path outside their home directory.

Supported Frameworks (14)

OWASP LLM Top 10 (2025) — prompt injection, supply chain, data leakage OWASP MCP Top 10 — MCP-specific security risks OWASP Agentic Top 10 — tool poisoning, rug pulls, credential theft OWASP AISVS v1.0 — AI Security Verification Standard (9 checks) MITRE ATLAS — adversarial ML threat framework NIST AI RMF — govern, map, measure, manage lifecycle NIST CSF 2.0 — identify, protect, detect, respond, recover NIST 800-53 Rev 5 — federal security controls (CM-8, RA-5, SI-2, SR-3) FedRAMP Moderate — derived from NIST 800-53 controls EU AI Act — risk classification, transparency, SBOM requirements ISO 27001:2022 — information security controls (Annex A) SOC 2 — Trust Services Criteria CIS Controls v8 — implementation groups IG1/IG2/IG3 CMMC 2.0 — cybersecurity maturity model (Level 1-3)

Privacy & Data Handling

This skill installs agent-bom from PyPI. Verify the redaction behavior before running with any config files: # Step 1: Install pip install agent-bom # Step 2: Review redaction logic BEFORE scanning # sanitize_env_vars() replaces ALL env var values with ***REDACTED*** # BEFORE any config data is processed or stored: # https://github.com/msaad00/agent-bom/blob/main/src/agent_bom/security.py#L159 # Step 3: Review config parsing — only structural data extracted: # https://github.com/msaad00/agent-bom/blob/main/src/agent_bom/discovery/__init__.py # Step 4: Verify package provenance (Sigstore) agent-bom verify agent-bom # Step 5: Only then run scans agent-bom scan What is extracted: Server names, commands, args, and URLs from MCP client config files across 22 AI tools. What is NOT extracted: Env var values are replaced with ***REDACTED*** by sanitize_env_vars() before any processing. Only public package names and CVE IDs are sent to vulnerability databases. Cloud CIS checks use locally configured credentials and call only the cloud provider's own APIs.

Verification

Source: github.com/msaad00/agent-bom (Apache-2.0) Sigstore signed: agent-bom verify agent-bom@0.71.0 6,040+ tests with CodeQL + OpenSSF Scorecard No telemetry: Zero tracking, zero analytics

Category context

Code helpers, APIs, CLIs, browser automation, testing, and developer operations.

Source: Tencent SkillHub

Largest current source with strong distribution and engagement signals.

Package contents

Included in package
5 Docs
  • SKILL.md Primary doc
  • compliance/SKILL.md Docs
  • registry/SKILL.md Docs
  • runtime/SKILL.md Docs
  • scan/SKILL.md Docs