Skip to content

Latest commit

 

History

History
80 lines (56 loc) · 3.71 KB

File metadata and controls

80 lines (56 loc) · 3.71 KB

agent-bom

Open security platform for agentic infrastructure. Broad scanning, blast radius, runtime, and trust.

Your AI agent's dependencies have a CVE. Which credentials leak?

CVE-2025-1234  (CRITICAL · CVSS 9.8 · CISA KEV)
  |── better-sqlite3@9.0.0  (npm)
       |── sqlite-mcp  (MCP Server · unverified · root)
            |── Cursor IDE  (Agent · 4 servers · 12 tools)
            |── ANTHROPIC_KEY, DB_URL, AWS_SECRET  (Credentials exposed)
            |── query_db, read_file, write_file, run_shell  (Tools at risk)

 Fix: upgrade better-sqlite3 → 11.7.0

agent-bom maps the blast radius: CVE → package → MCP server → AI agent → credentials → tools.

Traditional scanners often stop at CVE → package. agent-bom shows which credentials and tools are actually at risk — with CWE-aware impact classification so a DoS vuln doesn't falsely claim credential exposure.

Canonical references:

agent-bom demo

Quick start

pip install agent-bom

agent-bom agents                              # Discover + scan local AI agents and MCP servers
agent-bom agents -p .                         # Scan project manifests plus agent/MCP context
agent-bom mesh --project .                    # Show the live agent / MCP topology
agent-bom check flask@2.0.0 --ecosystem pypi  # Pre-install CVE gate
agent-bom image nginx:latest                  # Container image scan
agent-bom iac Dockerfile k8s/ infra/main.tf   # IaC misconfigurations

What it scans

  • Agents + MCP — MCP clients, servers, tools, transports, trust posture
  • Skills + instructionsCLAUDE.md, AGENTS.md, .cursorrules, .windsurfrules, skills/*
  • Package risk — software supply chain scanning with enrichment and blast radius
  • Container images + IaC — native OCI parsing plus Dockerfile, Terraform, CloudFormation, Helm, and Kubernetes coverage
  • Cloud AI — cloud and AI infrastructure posture across major supported providers
  • Secrets + runtime — MCP proxy, Shield SDK, secrets, and redaction surfaces
  • Compliance + evidence — mapped governance and evidence-generation views

Key features

  • Blast radius mapping — CVE → package → MCP server → agent → credentials → tools
  • CWE-aware impact — RCE shows credential exposure, DoS does not
  • Portable outputs — SARIF, CycloneDX, SPDX, HTML, graph, JSON, and more
  • MCP server mode — expose agent-bom capabilities directly to MCP clients like Claude, Cursor, Windsurf, and Cortex CoCo / Cortex Code
  • Skill bundle identity — stable bundle hashes for skill and instruction file review
  • Dependency confusion detection — flags internal naming patterns
  • VEX generation — auto-triage with CWE-aware reachability

Read-only. Agentless. No secrets leave your machine.

How it works

How agent-bom works

Blast radius

Blast radius

Links