Skip to Content
Security — How Curate-Me Protects Your AI Agents

Security

Curate-Me is the governance layer that sits between your application and LLM providers. Every request passes through our security chain before reaching any model. Here is exactly what we protect against, and how.

135,000+ exposed OpenClaw instances found across 82 countries, 63% vulnerable (SecurityScorecard STRIKE team, January 2026). If you run AI agents in production, security is not optional.

The Threat Landscape

IncidentDateSeverityImpact
CVE-2026-25253 — One-click RCE via WebSocket hijackingJan 2026CVSS 8.8Remote code execution on any exposed instance
512 vulnerabilities in independent security audit (8 critical)Jan 2026CriticalMultiple attack vectors in default configuration
341 malicious ClawHub skills (ClawHavoc campaign)Feb 2026HighSupply-chain attack via skill marketplace
42,665 publicly exposed instances on ShodanFeb 2026HighZero auth on internet-facing agents

These are not hypothetical risks. They are documented incidents with CVE numbers and vendor advisories from Microsoft, CrowdStrike, Kaspersky, and Sophos.

How We Block Each Attack

Known AttackOur Defense
RCE via WebSocket hijacking (CVE-2026-25253)Network phase separation blocks outbound during execution
Docker sandbox escape4-tier sandbox with deny patterns prevents host access
Malicious skills (ClawHavoc)Multi-stage scanner with VirusTotal + YARA rules
Exposed instances (42,665 on Shodan)Agents run behind gateway auth — zero public surface
Runaway agent purchasesHITL approval queues for high-cost operations
API key / PII leakagePII scanning intercepts secrets before they reach providers
Prompt injectionSecurity scanner detects injection, jailbreak, and exfiltration patterns

Security Architecture

Defense in Depth

Every layer wraps the ones inside it. An attacker must defeat all layers to reach the innermost operations. If any layer blocks, the request never proceeds further.

┌─────────────────────────────────────────────┐ │ Container Isolation │ │ ┌───────────────────────────────────────┐ │ │ │ Governance Chain │ │ │ │ ┌─────────────────────────────────┐ │ │ │ │ │ PII + Security Scanning │ │ │ │ │ │ ┌───────────────────────────┐ │ │ │ │ │ │ │ Cost + Rate Limits │ │ │ │ │ │ │ │ ┌─────────────────────┐ │ │ │ │ │ │ │ │ │ HITL Approval │ │ │ │ │ │ │ │ │ │ │ │ │ │ │ │ │ │ │ │ (human sign-off │ │ │ │ │ │ │ │ │ │ before execution) │ │ │ │ │ │ │ │ │ └─────────────────────┘ │ │ │ │ │ │ │ └───────────────────────────┘ │ │ │ │ │ └─────────────────────────────────┘ │ │ │ └───────────────────────────────────────┘ │ └─────────────────────────────────────────────┘
Layer (outermost first)What it stops
Container IsolationHost access, sandbox escape, cross-tenant data access
Governance ChainUnauthorized models, untracked requests, policy violations
PII + Security ScanningData leaks, prompt injection, jailbreak, exfiltration
Cost + Rate LimitsBudget overruns, denial-of-wallet, runaway agents
HITL ApprovalHigh-risk operations executing without human review

Gateway Governance Chain (13 Steps)

Every LLM request passes through this chain. It short-circuits on the first denial. See the Governance Chain reference for full details including per-tier defaults and configuration.

Request arrives ┌──────────────────┐ blocked ┌─────────────────┐ │ 1. Plan │───────────▸│ 403 no plan │ │ Enforcement │ │ │ └───────┬──────────┘ └─────────────────┘ │ pass ┌──────────────────┐ too large ┌─────────────────┐ │ 2. Body Size │───────────▸│ 413 payload │ │ Limit │ │ too large │ └───────┬──────────┘ └─────────────────┘ │ pass ┌──────────────────┐ blocked ┌─────────────────┐ │ 3. Rate │───────────▸│ 429 + IETF │ │ Limit │ │ headers │ └───────┬──────────┘ └─────────────────┘ │ pass ┌──────────────────┐ denied ┌─────────────────┐ │ 4. Plan │───────────▸│ 403 feature not │ │ Entitlement │ │ in plan │ └───────┬──────────┘ └─────────────────┘ │ pass ┌──────────────────┐ over cap ┌─────────────────┐ │ 5. Reasoning │───────────▸│ 400 reasoning │ │ Token Cap │ │ cap exceeded │ └───────┬──────────┘ └─────────────────┘ │ pass ┌──────────────────┐ over ┌─────────────────┐ │ 6. Cost │───────────▸│ 402 per-request │ │ Estimate │ budget │ limit exceeded │ └───────┬──────────┘ └─────────────────┘ │ pass ┌──────────────────┐ over ┌─────────────────┐ │ 7. Hierarchical │───────────▸│ 402 budget │ │ Budget │ budget │ exceeded │ └───────┬──────────┘ └─────────────────┘ │ pass ┌──────────────────┐ over ┌─────────────────┐ │ 8. Runner │───────────▸│ 402 session │ │ Session Budget│ budget │ budget exceeded │ └───────┬──────────┘ └─────────────────┘ │ pass ┌──────────────────┐ found ┌─────────────────┐ │ 9. PII │───────────▸│ 400 PII │ │ Scan │ PII │ detected │ └───────┬──────────┘ └─────────────────┘ │ clean ┌──────────────────┐ unsafe ┌─────────────────┐ │10. Content │───────────▸│ 400 content │ │ Safety │ │ blocked │ └───────┬──────────┘ └─────────────────┘ │ safe ┌──────────────────┐ threat ┌─────────────────┐ │11. Security │───────────▸│ 400 threat │ │ Scanner │ found │ blocked │ └───────┬──────────┘ └─────────────────┘ │ safe ┌──────────────────┐ denied ┌─────────────────┐ │12. Model │───────────▸│ 403 model │ │ Allowlist │ │ not allowed │ └───────┬──────────┘ └─────────────────┘ │ allowed ┌──────────────────┐ needs ┌─────────────────┐ │13. HITL │───────────▸│ 202 queued │ │ Gate │ approval │ for review │ └───────┬──────────┘ └─────────────────┘ │ auto-approved Forward to provider
  1. Plan Enforcement — Verify the org has an active subscription plan
  2. Body Size Limit — Reject payloads exceeding the plan’s size cap (e.g. 1 MB Free, 50 MB Enterprise)
  3. Rate Limiting — Per-org, per-key request throttling (IETF RateLimit-* headers)
  4. Plan Entitlement — Check that the requested feature (streaming, extended thinking, etc.) is available on the org’s plan
  5. Reasoning Token Cap — Enforce maximum reasoning/thinking tokens per request by plan tier
  6. Cost Estimation — Estimated cost checked against per-request cost limit
  7. Hierarchical Budget — Check org → team → key daily budget hierarchy
  8. Runner Session Budget — Enforce per-session spend caps for managed runner workloads
  9. PII Scanning — 14 regex patterns for SSN, credit cards, API keys, IBAN, email, phone, and more
  10. Content Safety — Block harmful, illegal, or policy-violating content
  11. Security Scanner — Prompt injection, jailbreak, and data exfiltration detection
  12. Model Allowlist — Enforce which models each org can use
  13. HITL Gate — Flag high-cost or sensitive requests for human approval

Sandbox Isolation (4 Tiers)

Every managed runner session runs in an isolated sandbox:

TierFilesystemNetworkUse Case
READ_ONLYRead project files, write only /tmpNone during executionAnalysis, reporting
WRITE_RESTRICTEDExplicit path patterns onlyAllowlisted domains onlyControlled automation
WRITE_PROJECTAnywhere in project treeBridge networkDevelopment tasks
FULL_ACCESSUnrestrictedFull networkTrusted admin only

Always-blocked paths (regardless of tier): .env, *.pem, *.key, .git/config, ~/.ssh/*, ~/.aws/*.

Network Phase Separation

Agent execution is divided into phases with different network access:

┌──────────┐ ┌───────────────┐ ┌───────────┐ Time │ SETUP │────▸│ EXECUTION │────▸│ TEARDOWN │ ────▸ │ │ │ │ │ │ │ Network: │ │ Network: OFF │ │ Network: │ │ ON │ │ │ │ ON │ │ │ │ No outbound │ │ │ │ Install │ │ connections. │ │ Upload │ │ deps, │ │ Agent runs │ │ artifacts,│ │ download │ │ locally only. │ │ push │ │ models │ │ │ │ results │ └──────────┘ └───────────────┘ └───────────┘

During execution, agents cannot make outbound network calls. This prevents data exfiltration, C2 communication, and unauthorized API calls.

Human-in-the-Loop (HITL)

TriggerDefault Threshold
Cost > threshold$10/request
External API callsAlways
File deletionsAlways
Git pushAlways
New skill installationCAUTION-rated

Approval queues visible in the dashboard with SLA tracking. Auto-deny after 24 hours (configurable).

Compliance

  • Immutable audit trail for every agent action
  • EU AI Act: Medication dosage scanning, VAT/IBAN detection, risk classification
  • SOC 2 compatible log structure (Enterprise plan)
  • GDPR: Data residency options, PII scanning, right to deletion
  • Export formats: JSON, PDF

Further Reading