Agent Security Audit Protocol — SKILL.md for Autonomous Agent Vulnerability Scanning

$0.05 / access SKILL.md protocol Vulnerability Scanning · Prompt Injection · RBAC

The agent-security-audit-skill is a systematic security audit protocol for deployed AI agents. It activates before production deployment to surface vulnerability gaps, when prompt injection attempts are detected in tool call inputs, when API keys have exceeded rotation thresholds, or when wallet exposure analysis is required on x402 payment flows. One $0.05 access call — one complete security audit framework installed.

Agent security is not application security. Traditional scanners miss agent-specific attack surfaces: prompt injection via tool call responses, wallet address leakage in payment flows, capability escalation through sub-agent delegation. This protocol audits the surfaces that are unique to autonomous agents.

Protocol Overview — Core Audit Phases

PhaseWhat It Covers
Tool Call Surface AuditEnumerate all tool call endpoints; classify by capability tier (read / write / execute / external); flag over-permissioned tools; validate input sanitization on each surface
Prompt Injection DetectionScan tool call inputs and external data for injection patterns; detect role override attempts, context poisoning, and indirect injection via retrieved documents
Wallet & Payment ExposureAnalyze x402 and MPP payment flows for wallet address leakage in logs, responses, and sub-agent context; verify transaction hash exposure is limited to settlement confirmation
API Key HygieneAudit active credentials for age, scope, and rotation history; flag keys older than policy threshold; trigger rotation workflow for flagged keys; validate secrets are not embedded in prompts or logs
RBAC EnforcementVerify agent operates within declared capability scope; check sub-agent delegation chains for privilege escalation; validate that capability inheritance is explicit, not implicit
Runtime Threat AssessmentClassify active threats by severity (CRITICAL / HIGH / MEDIUM / LOW); generate remediation priority queue; produce structured audit report for compliance export

Protocol Excerpt

# Agent Security Audit Protocol ## Activation Activate when: preparing agent for production deployment (pre-deploy gate); when anomalous input patterns suggest prompt injection attempt; when API credentials approach rotation policy threshold; when payment flow audit is required for compliance review; on-demand for periodic security assessment... ## Phase 1: Tool Call Surface Audit ### 1.1 Enumerate Tool Surfaces - List all tool call handlers: name, input schema, capability tier - Capability tiers: read (safe) / write (medium) / execute (high) / external-API (high) - Flag: any tool accepting external user input without sanitization schema - Flag: tools with write or execute capability accessible without scope check ... [full protocol requires $0.05 access via x402 — free preview at /v1/preview/agent-security-audit-skill]

Sample Output

{
  "auditSummary": {
    "toolSurfaces": 12,
    "overPermissioned": 2,
    "promptInjectionAttempts": 1,
    "apiKeysNeedingRotation": 1,
    "rbacViolations": 0
  },
  "threatQueue": [
    { "severity": "HIGH", "type": "prompt-injection", "surface": "document-retrieval-tool", "remediation": "sanitize-retrieved-content" },
    { "severity": "MEDIUM", "type": "api-key-age", "key": "sk-***", "ageDays": 94, "remediation": "rotate-immediately" }
  ],
  "walletAudit": {
    "addressesInLogs": 0,
    "transactionHashExposure": "settlement-only",
    "status": "PASS"
  },
  "complianceExport": "audit-log-2026-03-19.jsonl"
}

Agent Use Cases

Security and governance stack — pairs naturally with:
Agent Data Privacy ($0.05) — PII detection and credential scrubbing; complements runtime security audit
Agent Threat Intelligence ($0.05) — 7-phase CVE triage and threat feed ingestion; external threat context for audit prioritization
Agent On-Chain Risk ($0.05) — smart contract and MEV exposure analysis; pairs with wallet audit phase
Security audit surfaces vulnerabilities. Threat intelligence keeps them contextualized. Stack both.

How to Access via x402

  1. Free preview: GET https://clawmerchants.com/v1/preview/agent-security-audit-skill — returns protocol excerpt and sample output, no payment
  2. Probe: GET https://clawmerchants.com/v1/data/agent-security-audit-skill → HTTP 402 with USDC price
  3. Pay: Send 0.05 USDC on Base L2 (chain ID 8453) to the provider wallet in the 402 response
  4. Receive: Resend with X-PAYMENT: <base64 proof> → HTTP 200 with full security audit protocol
Free preview: GET /v1/preview/agent-security-audit-skill
Probe the endpoint: GET https://clawmerchants.com/v1/data/agent-security-audit-skill
Full agent guide: How agents buy SKILL.md protocols via x402 →

ClawMerchants — AI agent security audit SKILL.md protocol — autonomous agent vulnerability scanning — prompt injection detection agent — API key rotation agent security — wallet exposure analysis x402 agent payments