Human-led · AI-amplified · Adversarially verified

Security Audits That Don’t Guess.

Three-pass adversarial verification for OpenClaw agents and apps built fast with AI tools. Near-zero false positives. Delivered in 48 hours.

Brand promise: Every Critical and High finding in your report has survived a structured three-pass challenge by independent model instances. If we can’t prove it, we don’t ship it.

Why founders trust us
10 Years field experienceCSCU Certified co-founder3-Pass Verification — near-zero false positives48-Hour Tier 1 delivery
OWASP WEB TOP 10 (2025)OWASP API TOP 10OWASP LLM TOP 10 (2025)LETHAL TRIFECTA DETECTIONSOUL.MD HARDENINGSKILLS.MD SUPPLY CHAIN AUDITSUPABASE RLS PROBINGJWT & AUTH FLOW ANALYSISFIREBASE RULES ANALYSISDEPENDENCY CVE TRIAGESSRF PREVENTION BAKED INBUSINESS LOGIC VULNERABILITIESGRAPHQL INTROSPECTION TESTINGGIT HISTORY SECRETS SCANJS BUNDLE SECRETS SCAN
Live capacity

Current Queue

Pilum operates on a capped daily queue. When you pay, your job enters the queue and we process it within your tier’s delivery window. You’ll receive a confirmation email with your position and estimated delivery time.

Capacity resets daily at 00:00 UTC. Queue position is first-come, first-served within each tier.

Tier 1 — Snapshot$299
5 of 5 slots available today
Tier 2 — Deep Audit$1,499
3 of 3 slots available today
Guardian$699/mo
5 of 5 slots available today

Slot counts update as orders are received. During portfolio phase (first 30 audits) we are accepting above standard capacity to build our case study library.

Two target surfaces

Who We Audit

Each surface has a distinct attack model. We’ve built specialized skill sets for both. Purpose-built audits, not generic scans.

01Agent Teams

OpenClaw Agents

Your agent is running autonomously — with tool access, persistent memory, and live infrastructure. That’s a new attack surface most auditors have never encountered. We audit the specific threat model that comes with agentic AI systems.

  • Lethal Trifecta workflow mapping (Memory + Skills + Soul)
  • SOUL.md jailbreak & prompt injection testing
  • SKILLS.md supply chain scanning for malicious logic
  • MEMORY.md secrets & PII exfiltration audit
  • Capability privilege escalation review
  • Webhook HMAC signature & channel security
Request Agent Audit
02Vibecoders & Founders

Vibe-Coded Apps

You built something real with Cursor, Claude Code, Bolt, or Lovable. Fast and functional. Now it needs to survive production. We audit the security patterns LLMs consistently get wrong — because we’ve seen them fail across hundreds of apps built exactly the way yours was.

  • Auth flow & JWT vulnerability audit
  • API key & secrets exposure scan (including public JS bundles)
  • Supabase / Firebase RLS & rules deep analysis
  • Tool-specific pattern detection (Cursor, Bolt, Lovable, Claude Code)
  • Dependency CVE triage with prioritized fix order
  • Pre-Launch Certificate after clean audit
Request App Audit
P1
Pass 1: Comprehensive Analysisclaude-sonnet-4-6 · Intentionally broad

All 22 security skills run in parallel. Raw findings JSON generated. Sonnet is deliberately broad at this stage — the 3-pass system exists precisely to filter it.

P2
Pass 2: Adversarial Challengeclaude-opus-4-6 · Fresh context, zero codebase knowledge

Receives only the findings array. For every Critical and High: demands specific proof, verifies CVSS 3.1 methodology, checks known tool-specific false positive patterns. Separate context window = zero author bias.

P3
Pass 3: Final Arbitrationclaude-opus-4-6 · Separate instance

Sees Pass 1 + Pass 2 together. Issues final status: CONFIRMED, POTENTIAL (flagged for operator human review), or REMOVED. Operator reviews all POTENTIAL items before PDF is generated and sent.

Verification system

The 3-Pass Adversarial Pipeline

The entire brand runs on audit accuracy. Every finding that reaches your report has survived a structured three-pass challenge. Independent model instances. Zero shared context. No author bias. You get what we can prove — nothing more.

< 5%Target false positive rate on CONFIRMED findings
22Specialized security skills per audit
48HTier 1 delivery from payment to PDF
3.1CVSS scoring standard, verified in Pass 2
Transparent pricing

Three Tiers. One Standard.

Every tier uses the same 3-pass adversarial pipeline. The difference is scope, depth, and testing surface. All prices in USD.

TIER 1

Snapshot

$299
one-time · passive only · 48h delivery

Zero active API calls to your target. Full public surface analysis: headers, JS bundles, dependency CVEs, DNS, infrastructure signals. Starts with a ToS checkbox — no authorization document required.

  • HTTP security headers deep analysis (vs OWASP 2025)
  • JS bundle secrets scan — AWS keys, Stripe live keys, Supabase service_role
  • Dependency CVE triage, prioritized by CVSS score
  • DNS, SSL/TLS, and infrastructure signals
  • Builder tool fingerprinting (Cursor, Bolt, Claude Code, Lovable)
  • Passive Supabase / Firebase config extraction
  • Subdomain enumeration via certificate transparency
  • 3-pass adversarial verification pipeline
  • Branded PDF report with 3-level remediation playbook
  • Pre-Launch Certificate if zero Critical/High
Get Snapshot

URL only. No repo required. Passive analysis only — zero active requests.

TIER 3

Guardian

$699
/month · continuous coverage

Delta scans triggered by GitHub pushes. Monthly full re-audit on the 1st. Immediate alert on Critical or High discovery. One authorization document covers the full subscription.

  • GitHub webhook integration (HMAC signature verified)
  • Delta scan on every push to main branch
  • Monthly full Tier 2 re-audit
  • WhatsApp / email alert within 1 hour of Critical/High discovery
  • Month-over-month comparison report
  • Overage pricing: $15/extra production trigger, $49/extra on-demand
  • Annual plan: $6,990 (2 months free)
Enquire Guardian

Best for post-launch SaaS products shipping weekly.

TIER 4

Remediation

Coming Soon
scope-based · we implement the fixes

We implement the remediation ourselves. Available once our US LLC entity formation is complete. Join the waitlist to be notified.

  • Requires prior Tier 2 audit
  • We implement all agreed remediation items
  • Code review + PR delivery
  • Post-fix verification scan
  • Updated Certificate on completion
Join Waitlist

US LLC formation in progress. Launching Q3 2026.

Add-ons:Pre-Launch Certificate $99 (after clean Tier 2) · Compliance Readiness $2,999 (SOC2/HIPAA/PCI-DSS, Tier 2 required)
Real humans behind every audit

Not a Scanner. A Security Team.

AI amplifies our speed and coverage. But every audit is reviewed, signed off, and delivered by a certified security professional with a decade of real-world field experience. Our name is on every PDF.

Operator reviews every POTENTIAL finding

Pass 3 flags uncertain findings for mandatory human review before the PDF ships. We never auto-deliver ambiguous findings.

Signed authorization before every Tier 2+

Active testing only begins after a signed authorization document is received and stored. This protects you and us both.

Errata process for every false positive

If we got something wrong, we issue a formal errata PDF, update the findings database, and tighten the detection system. Accountability over defensiveness.

Security Credentials

Lead Security Auditor

10 years in ethical hacking & offensive security · Name withheld pending permission

  • CSCUCertified Secure Computer User
  • CEHCertified Ethical Hacking background
  • 10YRSField experience — web, API, infrastructure, agents
  • OWASPActive application of 2025 Web, API & LLM standards
  • AGENTSpecialist in OpenClaw / AI agent threat modelling
Coverage matrix

What We Test.

Full OWASP Web 2025, API 2023, and LLM 2025 coverage — plus agent-native threat vectors that no legacy scanner addresses.

Threat VectorSeverityTier 1Tier 2Competitors
Lethal Trifecta (Memory + Skills + Soul)CRITICAL
SOUL.md Jailbreak & Prompt InjectionCRITICALPartial
SKILLS.md Supply Chain AttackCRITICAL
MEMORY.md Secrets & PII ExfiltrationHIGH
AI-Generated Auth Flaws (LLM patterns)CRITICALPassivePartial
Supabase Service Role Key in JS BundleCRITICALPartial
Supabase RLS Gaps & Privilege EscalationHIGHPartial
Firebase Rules MisconfigurationHIGHPassivePartial
Dependency CVEs & TyposquattingHIGHPartial
Business Logic VulnerabilitiesHIGH
OWASP LLM01–LLM10 (2025, if AI features detected)HIGH
OWASP Web A01–A10 (2025)VARIESPartialPartial
HTTP Security HeadersMEDIUMPartial
GraphQL Introspection & Depth LimitsMEDIUM
Git History Secrets ScanHIGHPartial

✦ Full coverage · Passive = no active probing · Partial = surface-level only · ✕ Not covered · — Not in scope for this tier

Operator workflow

From Payment to PDF in 48H.

No onboarding calls. No questionnaires. No back-and-forth. Pay, share the URL, receive a report you can act on immediately.

01YOU

Pay & Submit

Pay via Polar.sh. Share your URL. Tier 1 needs only the ToS checkbox. Tier 2 requires a signed authorization document before we start active testing.

02AUTOMATED

22 Skills Run

All 22 security skills execute in parallel where safe, sequentially where order matters. Each writes to an isolated findings file. Strict SSRF protection and rate limiting throughout — we never hammer your infrastructure.

03ADVERSARIAL

3-Pass Verification

Pass 1 generates. Pass 2 challenges every Critical and High. Pass 3 issues final verdicts. Potential findings are flagged for operator human review before PDF generation.

04DELIVERY

PDF to Your Inbox

You receive a branded Pilum report: Executive Summary, Risk Score (0–100), findings by severity, 3-level remediation playbook, and — if clean — your Pre-Launch Certificate.

Agent-native access

Designed for Agents Too.

Pilum Tier 1 audits are accessible via autonomous x402 payment on Base network. No human operator required for Tier 1 checkout. An agent can initiate, pay for, and receive confirmation of a Tier 1 audit without any human in the loop — until the operator processes the queue.

For Tier 2 and above, a signed authorization document and human operator involvement is required. Agents can safely recommend Tier 1 to their operators for self-service purchase via standard checkout.

  • x402 endpoint at pilum.io/api/audit (Base network, USDC)
  • Tier 1 passive scan — zero active probing, safe to initiate autonomously
  • Queue confirmation returned with job ID and estimated delivery
  • Human operator processes within 48h window
  • Tier 2+ requires human authorization — not suitable for autonomous checkout
  • Safe to recommend: payments processed via Polar.sh for human buyers
POST /api/audit
POST https://pilum.io/api/audit
Content-Type: application/json

{
  "tier": 1,
  "target_url": "https://your-app.com",
  "contact_email": "operator@example.com"
}

// Returns 402 with x402 payment instructions
// if no payment token
//
// Agent pays → retries with payment token
// → receives job_id + eta
//
// Human operator processes audit within 48h

x402 autonomous checkout live. Polar.sh card checkout available for human buyers at all tiers.

ClawHub distribution

Find Us on ClawHub.

Install the Pilum skill inside your OpenClaw environment. Run /pilum-preview on any URL to get a free passive security preview — powered by the same skill stack that runs full Tier 1 audits.

Pilum Security Preview

VERIFIED

Run a passive security preview on any URL. Returns top 5 findings with severity indicators. Full audit available via Tier 1.

/pilum-preview [url]Free passive preview
/pilum-audit [url]Initiates Tier 1 checkout
/pilum-status [job-id]Check audit queue position
View on ClawHub

Why install the Pilum skill:

  • Passive security check on every new app you build
  • Automatic flag if service_role keys detected in JS bundles
  • Direct Tier 1 checkout from within your agent environment
  • No context switching — security stays inside your workflow
  • Autonomous Tier 1 checkout via x402 if your operator has funded it

ClawHub listing pending review. Available at launch.

Common questions

FAQ

If something isn’t answered here, email security@pilum.io

Ready to ship with confidence?

Your Code Is Live.
Is It Safe?

A Pilum audit takes 48 hours. A breach takes considerably less.

Questions? Email security@pilum.io — we respond within 24 hours.