Live Security Intelligence — CVE Feeds for Agent-Native Security Monitoring

$0.02 / query 30 min refresh OSV.dev + NVD

security-intel-live is a real-time security vulnerability feed for AI agents. Every entry includes CVE ID, CVSS score, affected packages, affected protocols, and a human-readable summary. The feed prioritizes high and critical severity entries (CVSS ≥ 7.0) so security agents surface the most urgent vulnerabilities first. Updated every 30 minutes from OSV.dev and NVD. Inspect for free, pay $0.02 USDC per query via x402.

High-severity first: security-intel-live ranks entries by CVSS score descending. A CVSS 9.8 (critical) OpenZeppelin vulnerability will appear before a CVSS 4.1 (medium) advisory — agents get the most urgent intelligence at the top of every response.

Data Format

Each query returns recent CVEs and security advisories with agent-useful severity context. Sample response:

{
  "vulnerabilities": [
    {
      "cveId": "CVE-2026-1234",
      "cvssScore": 9.8,
      "severity": "CRITICAL",
      "package": "OpenZeppelin/openzeppelin-contracts",
      "affectedProtocols": ["ethereum", "base"],
      "summary": "Reentrancy vulnerability in ERC-20 transfer hook allows unauthorized fund withdrawal",
      "publishedAt": "2026-03-16T06:00:00Z"
    },
    {
      "cveId": "CVE-2026-1189",
      "cvssScore": 8.1,
      "severity": "HIGH",
      "package": "ethers/ethers.js",
      "affectedProtocols": ["ethereum"],
      "summary": "Signature malleability in signMessage allows replay attacks under specific conditions",
      "publishedAt": "2026-03-15T18:30:00Z"
    },
    {
      "cveId": "CVE-2026-1102",
      "cvssScore": 7.5,
      "severity": "HIGH",
      "package": "nodejs/node",
      "affectedProtocols": [],
      "summary": "Path traversal vulnerability in fs module allows arbitrary file read on Windows",
      "publishedAt": "2026-03-15T12:00:00Z"
    }
  ],
  "total_vulnerabilities": 14,
  "timestamp": "2026-03-16T09:00:00Z",
  "sources": ["OSV.dev", "NVD"]
}

Fields

FieldTypeDescription
cveIdstringCVE identifier (e.g. CVE-2026-1234)
cvssScorenumberCVSS v3 base score (0.0–10.0)
severitystringSeverity band: CRITICAL, HIGH, MEDIUM, LOW
packagestringAffected package or library name
affectedProtocolsstring[]Blockchain/protocol contexts if applicable
summarystring1-sentence description of the vulnerability
publishedAtstringISO 8601 publication timestamp
total_vulnerabilitiesnumberTotal CVE count in current feed window

Agent Use Cases

How to Access via x402

  1. Free preview: GET https://clawmerchants.com/v1/preview/security-intel-live — no payment, returns latest sample
  2. Probe: GET https://clawmerchants.com/v1/data/security-intel-live → HTTP 402 with USDC payment details
  3. Pay: Send 0.02 USDC on Base L2 (chain ID 8453) to the provider wallet in the 402 response
  4. Receive: Resend with X-PAYMENT: <base64 proof> → HTTP 200 with live CVE data

Pricing

$0.02 USDC per query — no subscription, no API key. Security agents typically query once per CI/CD run or audit session. At $0.02/query, even a high-frequency deployment pipeline running 100 builds/day costs $2/day — far less than a commercial CVE feed subscription.

Free preview: GET /v1/preview/security-intel-live
Probe the endpoint: GET https://clawmerchants.com/v1/data/security-intel-live
Full agent guide: How agents buy data via x402 →

ClawMerchants — live CVE and security intelligence for AI agents — x402 + USDC + Base L2