AI-powered · Human-verified · Adversarially proven

Security Audits That Don’t Guess.

Three-pass adversarial verification for OpenClaw agents and apps built fast with AI tools. Near-zero false positives. Delivered in 48 hours.

Brand promise: Every Critical and High finding in your report has survived a structured three-pass challenge by independent model instances. If we can’t prove it, we don’t ship it.

Why founders trust us
10 Years field experienceCSCU Certified co-founder3-Pass Verification — near-zero false positives48-Hour Tier 1 delivery
OWASP WEB TOP 10 (2025)OWASP API TOP 10OWASP LLM TOP 10 (2025)LETHAL TRIFECTA DETECTIONSOUL.MD HARDENINGSKILLS.MD SUPPLY CHAIN AUDITSUPABASE RLS PROBINGJWT & AUTH FLOW ANALYSISFIREBASE RULES ANALYSISDEPENDENCY CVE TRIAGESSRF PREVENTION BAKED INBUSINESS LOGIC VULNERABILITIESGRAPHQL INTROSPECTION TESTINGGIT HISTORY SECRETS SCANJS BUNDLE SECRETS SCAN
Service availability

Current Status

When you pay, your job enters the queue and we process it within your tier’s delivery window. You’ll receive a confirmation email with your estimated delivery time.

Queue position is first-come, first-served within each tier.

Security Snapshot$299
Deep Audit$1,499
Guardian Quarterly$1,999/qtr
Two target surfaces

Who We Audit

Each surface has a distinct attack model. We’ve built specialized skill sets for both. Purpose-built audits, not generic scans.

01Agent Teams

OpenClaw Agents

Your agent is running autonomously — with tool access, persistent memory, and live infrastructure. That’s a new attack surface most auditors have never encountered. We audit the specific threat model that comes with agentic AI systems.

  • Lethal Trifecta workflow mapping (Memory + Skills + Soul)
  • SOUL.md jailbreak & prompt injection testing
  • SKILLS.md supply chain scanning for malicious logic
  • MEMORY.md secrets & PII exfiltration audit
  • Capability privilege escalation review
  • Webhook HMAC signature & channel security
Request Agent Audit
02Vibecoders & Founders

Vibe-Coded Apps

You built something real with Cursor, Claude Code, Bolt, or Lovable. Fast and functional. Now it needs to survive production. We audit the security patterns LLMs consistently get wrong — because we’ve seen them fail across hundreds of apps built exactly the way yours was.

  • Auth flow & JWT vulnerability audit
  • API key & secrets exposure scan (including public JS bundles)
  • Supabase / Firebase RLS & rules deep analysis
  • Tool-specific pattern detection (Cursor, Bolt, Lovable, Claude Code)
  • Dependency CVE triage with prioritized fix order
  • Pre-Launch Certificate after clean audit
Request App Audit
P1
Pass 1: Comprehensive AnalysisPass 1 Model · Intentionally broad

All 22 security skills run in parallel. Raw findings JSON generated. The model is deliberately broad at this stage — the 3-pass system exists precisely to filter it.

P2
Pass 2: Adversarial ChallengePass 2 Model · Fresh context, zero codebase knowledge

Receives only the findings array. For every Critical and High: demands specific proof, verifies CVSS 3.1 methodology, checks known tool-specific false positive patterns. Separate context window = zero author bias.

P3
Pass 3: Final ArbitrationPass 3 Model · Separate instance

Sees Pass 1 + Pass 2 together. Issues final status: CONFIRMED, POTENTIAL (flagged for operator human review), or REMOVED. Operator reviews all POTENTIAL items before PDF is generated and sent.

Verification system

The 3-Pass Adversarial Pipeline

The entire brand runs on audit accuracy. Every finding that reaches your report has survived a structured three-pass challenge. Independent model instances. Zero shared context. No author bias. You get what we can prove — nothing more.

< 5%Target false positive rate on CONFIRMED findings
22Specialized security skills per audit
48HTier 1 delivery from payment to PDF
3.1CVSS scoring standard, verified in Pass 2
Transparent pricing

Security At Every Stage.

Every tier uses the same 3-pass adversarial pipeline. The difference is scope, depth, and testing surface. All prices in USD.

TIER 1

Security Snapshot

$299
One-time passive scan

Zero active API calls. We analyze your public surface, headers, JS bundles, and infrastructure signals. Perfect for a quick check after shipping.

  • 22 security dimensions analyzed
  • HTTP headers, JS secrets, dependency CVEs
  • Infrastructure and Supabase/Firebase review
  • AI tool detection (Cursor, Lovable, Bolt, v0)
  • 3-pass adversarial verification
  • Branded PDF report in 24-48 hours
  • Copy-paste remediation steps
Get Snapshot — $299

You provide: App URL only.

TIER 3

Guardian Quarterly

$1,999
/quarter · continuous coverage

Full Deep Audit on signup, then monthly monitoring with quarterly re-audits. No monthly option — no loopholes.

  • Full Deep Audit in week 1 (same as $1,499 Tier 2)
  • Monthly Tier 1 passive re-scan + delta analysis
  • Full Deep Audit re-run every quarter
  • Monthly PDF trend report (new / resolved / unchanged)
  • Immediate Critical/High alerts within 1 hour
  • Priority 4-hour response time
  • GitHub webhook integration (HMAC verified)
  • Overage pricing: $15/extra production trigger, $49/extra on-demand
Start Guardian — $1,999/quarter

You provide: App URL + GitHub repo Authorization: Single signed document covers full subscription

Compare Features

FeatureSnapshotDeep AuditGuardian QtrGuardian Ann
HTTP security headers
JS bundle analysis
Dependency CVE scan
Infrastructure recon
Builder tool detection
Supabase passive scan
Supabase active test
Auth flow testing
API endpoint testing
Source code review
OSINT / social eng.
3-pass verification
Remediation playbookBasicDetailedDetailedDetailed
Monthly monitoring
Quarterly full re-audit
Critical/High alerts
Priority response4 hours4 hours
Report formatPDFPDFPDF (mo)PDF (mo)
Turnaround24-48h3-5 daysContinuousContinuous
AuthorizationToS checkoutSigned docSigned docSigned doc
Optional Add-ons:Pre-Launch Certificate ($99 after clean Deep Audit)Remediation Package ($2,000-$8,000 we fix it for you)Compliance Readiness ($2,999 SOC2/HIPAA mapping)Contact us to add
Quality assurance

Not a Generic Scanner. A Precision Pipeline.

22 specialized security skills run through a 3-pass adversarial pipeline. Every finding is challenged by independent model instances before a certified security professional signs off on the final report. If we can’t prove it, we don’t ship it.

Operator reviews every POTENTIAL finding

Pass 3 flags uncertain findings for mandatory human review before the PDF ships. We never auto-deliver ambiguous findings.

Signed authorization before every Tier 2+

Active testing only begins after a signed authorization document is received and stored. This protects you and us both.

Errata process for every false positive

If we got something wrong, we issue a formal errata PDF, update the findings database, and tighten the detection system. Accountability over defensiveness.

Our pipeline was built by engineers with a decade of offensive security experience. Every detection pattern, every CVSS scoring rule, and every false positive filter reflects real-world field knowledge baked into the system.

Security Credentials

Lead Security Auditor

10 years in ethical hacking & offensive security · Name withheld pending permission

  • CSCUCertified Secure Computer User
  • CEHCertified Ethical Hacking background
  • 10YRSField experience — web, API, infrastructure, agents
  • OWASPActive application of 2025 Web, API & LLM standards
  • AGENTSpecialist in OpenClaw / AI agent threat modelling
Coverage matrix

What We Test.

Full OWASP Web 2025, API 2023, and LLM 2025 coverage — plus agent-native threat vectors that no legacy scanner addresses.

Threat VectorSeverityTier 1Tier 2Competitors
Lethal Trifecta (Memory + Skills + Soul)CRITICAL
SOUL.md Jailbreak & Prompt InjectionCRITICALPartial
SKILLS.md Supply Chain AttackCRITICAL
MEMORY.md Secrets & PII ExfiltrationHIGH
AI-Generated Auth Flaws (LLM patterns)CRITICALPassivePartial
Supabase Service Role Key in JS BundleCRITICALPartial
Supabase RLS Gaps & Privilege EscalationHIGHPartial
Firebase Rules MisconfigurationHIGHPassivePartial
Dependency CVEs & TyposquattingHIGHPartial
Business Logic VulnerabilitiesHIGH
OWASP LLM01–LLM10 (2025, if AI features detected)HIGH
OWASP Web A01–A10 (2025)VARIESPartialPartial
HTTP Security HeadersMEDIUMPartial
GraphQL Introspection & Depth LimitsMEDIUM
Git History Secrets ScanHIGHPartial

✦ Full coverage · Passive = no active probing · Partial = surface-level only · ✕ Not covered · — Not in scope for this tier

Operator workflow

From Payment to PDF in 48H.

No onboarding calls. No questionnaires. No back-and-forth. Pay, share the URL, receive a report you can act on immediately.

01YOU

Pay & Submit

Pay via our checkout page. Share your URL. Tier 1 needs only the ToS checkbox. Tier 2 requires a signed authorization document before we start active testing.

02AUTOMATED

22 Skills Run

All 22 security skills execute in parallel where safe, sequentially where order matters. Each writes to an isolated findings file. Strict SSRF protection and rate limiting throughout — we never hammer your infrastructure.

03ADVERSARIAL

3-Pass Verification

Pass 1 generates. Pass 2 challenges every Critical and High. Pass 3 issues final verdicts. Potential findings are flagged for operator human review before PDF generation.

04DELIVERY

PDF to Your Inbox

You receive a branded Pilum report: Executive Summary, Risk Score (0–100), findings by severity, 3-level remediation playbook, and — if clean — your Pre-Launch Certificate.

Agent-native access

Designed for Agents Too.

Pilum Tier 1 audits are accessible via autonomous x402 payment on Polygon network. No human operator required for Tier 1 checkout. An agent can initiate, pay for, and receive confirmation of a Tier 1 audit without any human in the loop — until the operator processes the queue.

For Tier 2 and above, a signed authorization document and human operator involvement is required. Agents can safely recommend Tier 1 to their operators for self-service purchase via standard checkout.

  • x402 endpoint at pilum.io/api/audit (Polygon network, USDC)
  • Tier 1 passive scan — zero active probing, safe to initiate autonomously
  • Queue confirmation returned with job ID and estimated delivery
  • Human operator processes within 48h window
  • Tier 2+ requires human authorization — not suitable for autonomous checkout
  • Safe to recommend: payments processed via standard checkout for human buyers
POST /api/audit
POST https://pilum.io/api/audit
Content-Type: application/json

{
  "tier": 1,
  "target_url": "https://your-app.com",
  "contact_email": "operator@example.com"
}

// Returns 402 with x402 payment instructions
// if no payment token
//
// Agent pays → retries with payment token
// → receives job_id + eta
//
// Human operator processes audit within 48h

x402 autonomous checkout live. Standard card checkout available for human buyers at all tiers.

ClawHub distribution

Find Us on ClawHub.

Install the Pilum skill inside your OpenClaw environment. Run /pilum-preview on any URL to get a free passive security preview — powered by the same skill stack that runs full Tier 1 audits.

Pilum Security Preview

VERIFIED

Run a passive security preview on any URL. Returns top 5 findings with severity indicators. Full audit available via Tier 1.

/pilum-preview [url]Free passive preview
/pilum-audit [url]Initiates Tier 1 checkout
/pilum-status [job-id]Check audit queue position
View on ClawHub

Why install the Pilum skill:

  • Passive security check on every new app you build
  • Automatic flag if service_role keys detected in JS bundles
  • Direct Tier 1 checkout from within your agent environment
  • No context switching — security stays inside your workflow
  • Autonomous Tier 1 checkout via x402 if your operator has funded it

ClawHub listing pending review. Available at launch.

Common questions

FAQ

If something isn’t answered here, email security@pilum.io

Ready to ship with confidence?

Your Code Is Live.
Is It Safe?

A Pilum audit takes 48 hours. A breach takes considerably less.

Need ongoing protection? Plans from $1,999/quarter.

Questions? Email security@pilum.io — we respond within 24 hours.