
Spearbit
2.1K posts

Spearbit
@spearbit
Industry Leading Web3 Security. Request a security review here ➡ https://t.co/gqs2f17Yhd


Agents on @openclaw can run commands and act autonomously, one bad prompt and they could leak your production API keys. That’s why we built the control layer: introducing ClawSight.ai - the Endpoint Detection & Response platform built specifically for AI Agent Security. <20 seconds setup. Logs every action. Enforces policy before execution. Installation instructions below.




Perpl private mainnet is now live Drop a comment if you want access Check it out here: app.perpl.xyz

Finding bugs in the top 10 market cap protocols while the rest of the world sleeps. 🪐 Cantina's AI Code Analyzer is out here casually securing @Ripple's latest upgrade. What did your AI security tool do this weekend?

Just in: @Google kicked @OpenClaw's users off the Antigravity AI platform, blaming "malicious usage." But the real story? A wake-up call for AI security: token economics are now the real battleground. The facts: - OpenClaw used an OAuth plugin to access subsidized Gemini tokens via Antigravity. - Traffic spiked, degrading native service. - Google pulled access. Google called it malicious, while the open-source crowd called the ban draconian. In reality, this was a classic EDoS. Nobody hacked anything (there was no breach). Users found an open, subsidized API and ran with it. If your platform hands out compute with no guardrails, you’re asking for trouble. Calling users "malicious" for hitting a public endpoint is just blame-shifting for weak API design. OpenClaw is dropping Google support entirely. The takeaway for the AppSec community: securing AI agents is not only about preventing data exfiltration, but protecting unit economics. Ship an API with no guardrails, and the internet will eat it alive. That’s not a cyberattack, that’s just the law of distributed systems.


Status: High-severity vulnerability found by Cantina’s AI Code Analyzer in @OpenClaw (CVE-2026-26325). Our AI engine detected an allowlist bypass in OpenClaw's npm package. The flaw allows a mismatch between checked commands and executed commands. Full breakdown below:



