
Article
Inside the 'clawdhub' Malicious Campaign: AI Agent Skills Drop Reverse Shells on OpenClaw Marketplace
Read nowShowing 1 - 24 of 353 resources
Building Safer AI Agents with Structured Outputs
Learn how structured outputs help developers build safer, more reliable AI agents by enforcing strict schemas during token generation. Discover the essential frameworks and security tools needed to move your AI agents to an enforcement-based production environment.
SAST vs. DAST vs. IAST vs. RASP: Understanding Application Security Testing Methods
Navigate the key differences between SAST, DAST, IAST, and RASP. This guide explains how to integrate these testing methods throughout the software development lifecycle to eliminate blind spots and block real-time attacks.
4 Reasons Why Dynamic Security Testing Is Critical For All Your Assets
Attackers don't just target your crown jewels; they look for the weakest link in your entire application footprint. Limiting dynamic security testing to tier-one apps leaves dangerous blind spots across forgotten APIs and internal tools. Discover why universal DAST is critical for modern risk management and how it helps teams uncover hidden vulnerabilities before they become entry points for a breach.
Inside the 'clawdhub' Malicious Campaign: AI Agent Skills Drop Reverse Shells on OpenClaw Marketplace
Snyk security researchers have uncovered the clawdhub malicious campaign targeting the ClawHub AI marketplace with Trojanized skills that drop reverse shells. This sophisticated attack uses social engineering and obfuscated scripts to compromise hosts via AI agent capabilities on Windows and macOS. Learn how to identify these threats and secure your AI supply chain against evolving agentic workflow risks.
From SKILL.md to Shell Access in Three Lines of Markdown: Threat Modeling Agent Skills
Discover the lethal trifecta of AI agent security risks. Learn how malicious OpenClaw Skills and supply chain attacks like ClawHavoc put your data at risk. Threat model your AI agents and secure them with Snyk Evo.
DAST vs RASP: Understanding the Differences in Application Security
Understand the critical differences between DAST and RASP to build a robust application security strategy. This guide explores how DAST proactively identifies vulnerabilities before deployment while RASP provides real-time protection during runtime. Learn how to leverage both technologies to create a layered defense for your modern software stack.
5 Benefits of Using SAST and DAST Together
Discover why combining SAST and DAST is essential for comprehensive application security, from early code analysis to runtime validation. By integrating both methodologies, teams can reduce false positives, lower remediation costs, and automate security within CI/CD pipelines. Learn how to bridge the gap between development and security to build faster and more securely.
Cloud Network Security: Best Practices & Essential Strategies for Protecting Modern Cloud Infrastructure
Modern cloud security requires moving beyond traditional perimeters to embrace Zero Trust, AI-driven threat detection, and quantum-safe encryption. This guide outlines essential strategies for mitigating misconfigurations and managing the shared responsibility model. Learn how to automate your incident response to stay ahead of evolving DDoS and AI-weaponized attacks.
CSPM vs SSPM: Understanding the Differences and When You Need Both
Understand the critical differences between CSPM and SSPM and why modern enterprises need both to secure their cloud infrastructure and SaaS applications. While CSPM focuses on IaaS and PaaS security, SSPM targets risks within SaaS platforms like Microsoft 365 and Salesforce.
Debunking the Top 5 Myths About DAST
Modern Dynamic Application Security Testing (DAST) has evolved far beyond its outdated reputation for being slow or noisy. This guide debunks five common myths, demonstrating how AI-driven DAST provides fast, automated runtime security that catches critical vulnerabilities static analysis often misses.
SAST for SQL Injection Detection: A Complete Guide
Static Application Security Testing (SAST) is a cornerstone of a proactive defense against SQL injection (SQLi). Snyk Code uses the power of SAST to detect SQL injection vulnerabilities in source code, prevent attacks early, & strengthen application security before deployment.
Buffer Overflow Security Analysis: From Prevention to Detection & Defense
Protect your applications from buffer overflow attacks with a multi-layered security approach. Learn how SAST, DAST, runtime protections, and Snyk’s proactive tools help detect, prevent, and remediate memory corruption vulnerabilities in C/C++ and other high-risk environments.
5 AI Cloud Security Best Practices: A Comprehensive Guide for Securing AI Systems in the Cloud
Discover the top 5 AI cloud security best practices to protect your AI models, data, and pipelines. Learn how to secure AI systems in the cloud against emerging threats with this comprehensive guide.