# Send agent-bom to your agent
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
## Fast path
- Download the package from Yavira.
- Extract it into a folder your agent can access.
- Paste one of the prompts below and point your agent at the extracted folder.
## Suggested prompts
### New install

```text
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
```
### Upgrade existing

```text
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
```
## Machine-readable fields
```json
{
  "schemaVersion": "1.0",
  "item": {
    "slug": "agent-bom",
    "name": "agent-bom",
    "source": "tencent",
    "type": "skill",
    "category": "开发工具",
    "sourceUrl": "https://clawhub.ai/msaad00/agent-bom",
    "canonicalUrl": "https://clawhub.ai/msaad00/agent-bom",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadUrl": "/downloads/agent-bom",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=agent-bom",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "packageFormat": "ZIP package",
    "primaryDoc": "SKILL.md",
    "includedAssets": [
      "SKILL.md",
      "compliance/SKILL.md",
      "scan/SKILL.md",
      "registry/SKILL.md",
      "runtime/SKILL.md"
    ],
    "downloadMode": "redirect",
    "sourceHealth": {
      "source": "tencent",
      "slug": "agent-bom",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-05-11T15:17:13.566Z",
      "expiresAt": "2026-05-18T15:17:13.566Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=agent-bom",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=agent-bom",
        "contentDisposition": "attachment; filename=\"agent-bom-0.76.4.zip\"",
        "redirectLocation": null,
        "bodySnippet": null,
        "slug": "agent-bom"
      },
      "scope": "item",
      "summary": "Item download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this item.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/agent-bom"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    }
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/agent-bom",
    "downloadUrl": "https://openagent3.xyz/downloads/agent-bom",
    "agentUrl": "https://openagent3.xyz/skills/agent-bom/agent",
    "manifestUrl": "https://openagent3.xyz/skills/agent-bom/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/agent-bom/agent.md"
  }
}
```
## Documentation

### agent-bom — AI Agent Infrastructure Security Scanner

Discovers MCP clients and servers across 22 AI tools, scans for CVEs, maps
blast radius, runs cloud CIS benchmarks, checks OWASP/NIST/MITRE compliance,
generates SBOMs, and assesses AI infrastructure against AISVS v1.0 and MAESTRO
framework layers.

### Install

pipx install agent-bom
agent-bom scan              # auto-discover + scan
agent-bom check langchain   # check a specific package
agent-bom fs .              # scan filesystem packages
agent-bom image nginx:1.25  # scan container image (native, no Syft)
agent-bom cloud aws         # AWS CIS benchmark
agent-bom iac infra/        # scan Terraform/CloudFormation
agent-bom where             # show all discovery paths

### As an MCP Server

{
  "mcpServers": {
    "agent-bom": {
      "command": "uvx",
      "args": ["agent-bom", "mcp"]
    }
  }
}

### Vulnerability Scanning

ToolDescriptionscanFull discovery + vulnerability scan pipelinecheckCheck a package for CVEs (OSV, NVD, EPSS, KEV)blast_radiusMap CVE impact chain across agents, servers, credentialsremediatePrioritized remediation plan for vulnerabilitiesverifyPackage integrity + SLSA provenance checkdiffCompare two scan reports (new/resolved/persistent)whereShow MCP client config discovery pathsinventoryList discovered agents, servers, packages

### Compliance & Policy

ToolDescriptioncomplianceOWASP LLM/Agentic Top 10, EU AI Act, MITRE ATLAS, NIST AI RMFpolicy_checkEvaluate results against custom security policy (17 conditions)cis_benchmarkCIS benchmark checks (AWS, Azure v3.0, GCP v3.0, Snowflake)generate_sbomGenerate SBOM (CycloneDX or SPDX format)aisvs_benchmarkOWASP AISVS v1.0 compliance — 9 AI security checks

### Registry & Trust

ToolDescriptionregistry_lookupLook up MCP server in 427+ server security metadata registrymarketplace_checkPre-install trust check with registry cross-referencefleet_scanBatch registry lookup + risk scoring for MCP server inventoriesskill_trustAssess skill file trust level (5-category analysis)code_scanSAST scanning via Semgrep with CWE-based compliance mapping

### Runtime & Analytics

ToolDescriptioncontext_graphAgent context graph with lateral movement analysisanalytics_queryQuery vulnerability trends, posture history, and runtime eventsruntime_correlateCross-reference proxy audit JSONL with CVE findings, risk amplificationvector_db_scanProbe Qdrant/Weaviate/Chroma/Milvus for auth and exposuregpu_infra_scanGPU container and K8s node inventory + unauthenticated DCGM probe (MAESTRO KC6)

### Specialized Scans

ToolDescriptiondataset_card_scanScan dataset cards for bias, licensing, and provenance issuestraining_pipeline_scanScan training pipeline configs for security risksbrowser_extension_scanScan browser extensions for risky permissions and AI domain accessmodel_provenance_scanVerify model provenance and supply chain integrityprompt_scanScan prompt templates for injection and data leakage risksmodel_file_scanScan model files for unsafe serialization (pickle, etc.)license_compliance_scanFull SPDX license catalog scan with copyleft and network-copyleft detectioningest_external_scanImport Trivy/Grype/Syft scan results and merge into agent-bom findings

### Resources

ResourceDescriptionregistry://serversBrowse 427+ MCP server security metadata registry

### Example Workflows

# Check a package before installing
check(package="@modelcontextprotocol/server-filesystem", ecosystem="npm")

# Map blast radius of a CVE
blast_radius(cve_id="CVE-2024-21538")

# Full scan
scan()

# Run CIS benchmark
cis_benchmark(provider="aws")

# Run AISVS v1.0 compliance
aisvs_benchmark()

# Scan vector databases for auth misconfigurations
vector_db_scan()

# Discover GPU containers, K8s GPU nodes, and unauthenticated DCGM endpoints
gpu_infra_scan()

# Assess trust of a skill file
skill_trust(skill_content="<paste SKILL.md content>")

### Guardrails

Always do:

Show CVEs even when NVD analysis is pending or severity is unknown — a CVE ID with no details is still a real finding. Report what is known; mark severity as unknown explicitly.
Confirm with the user before scanning cloud environments (cis_benchmark) — these make live API calls to AWS/Azure/GCP using the user's credentials.
Treat UNKNOWN severity as unresolved, not benign — it means data is not yet available, not that the issue is minor.

Never do:

Do not modify any files, install packages, or change system configuration. This skill is read-only.
Do not transmit env var values, credentials, or file contents to any external service. Only package names and CVE IDs leave the machine.
Do not invoke scan() autonomously on sensitive environments without user confirmation. The autonomous_invocation policy is restricted.

Stop and ask the user when:

The user requests a cloud CIS benchmark and no cloud credentials are configured.
A scan finds CRITICAL CVEs — present findings and ask whether to generate a remediation plan.
The user asks to scan a path outside their home directory.

### Supported Frameworks (14)

OWASP LLM Top 10 (2025) — prompt injection, supply chain, data leakage
OWASP MCP Top 10 — MCP-specific security risks
OWASP Agentic Top 10 — tool poisoning, rug pulls, credential theft
OWASP AISVS v1.0 — AI Security Verification Standard (9 checks)
MITRE ATLAS — adversarial ML threat framework
NIST AI RMF — govern, map, measure, manage lifecycle
NIST CSF 2.0 — identify, protect, detect, respond, recover
NIST 800-53 Rev 5 — federal security controls (CM-8, RA-5, SI-2, SR-3)
FedRAMP Moderate — derived from NIST 800-53 controls
EU AI Act — risk classification, transparency, SBOM requirements
ISO 27001:2022 — information security controls (Annex A)
SOC 2 — Trust Services Criteria
CIS Controls v8 — implementation groups IG1/IG2/IG3
CMMC 2.0 — cybersecurity maturity model (Level 1-3)

### Privacy & Data Handling

This skill installs agent-bom from PyPI. Verify the redaction behavior
before running with any config files:

# Step 1: Install
pip install agent-bom

# Step 2: Review redaction logic BEFORE scanning
# sanitize_env_vars() replaces ALL env var values with ***REDACTED***
# BEFORE any config data is processed or stored:
# https://github.com/msaad00/agent-bom/blob/main/src/agent_bom/security.py#L159

# Step 3: Review config parsing — only structural data extracted:
# https://github.com/msaad00/agent-bom/blob/main/src/agent_bom/discovery/__init__.py

# Step 4: Verify package provenance (Sigstore)
agent-bom verify agent-bom

# Step 5: Only then run scans
agent-bom scan

What is extracted: Server names, commands, args, and URLs from MCP client
config files across 22 AI tools. What is NOT extracted: Env var values are
replaced with ***REDACTED*** by sanitize_env_vars() before any processing.
Only public package names and CVE IDs are sent to vulnerability databases.
Cloud CIS checks use locally configured credentials and call only the cloud
provider's own APIs.

### Verification

Source: github.com/msaad00/agent-bom (Apache-2.0)
Sigstore signed: agent-bom verify agent-bom@0.71.0
6,040+ tests with CodeQL + OpenSSF Scorecard
No telemetry: Zero tracking, zero analytics
## Trust
- Source: tencent
- Verification: Indexed source record
- Publisher: msaad00
- Version: 0.71.0
## Source health
- Status: healthy
- Item download looks usable.
- Yavira can redirect you to the upstream package for this item.
- Health scope: item
- Reason: direct_download_ok
- Checked at: 2026-05-11T15:17:13.566Z
- Expires at: 2026-05-18T15:17:13.566Z
- Recommended action: Download for OpenClaw
## Links
- [Detail page](https://openagent3.xyz/skills/agent-bom)
- [Send to Agent page](https://openagent3.xyz/skills/agent-bom/agent)
- [JSON manifest](https://openagent3.xyz/skills/agent-bom/agent.json)
- [Markdown brief](https://openagent3.xyz/skills/agent-bom/agent.md)
- [Download page](https://openagent3.xyz/downloads/agent-bom)