Rank
70
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Crawler Summary
The industry-standard Agentic Identity & Inventory Scanner. Automatically inventory autonomous agents (LangChain, AutoGen, CrewAI, PydanticAI) using static analysis, network heuristics, and eBPF. Foundational tool for AIBOM compliance and AgentOps governance. AgentDiscover Scanner **Open-Source AI Agent Discovery for the Enterprise** $1 $1 $1 $1 *Part of the $1 platform for autonomous AI governance* --- The finding that matters A GHOST agent is an AI system making real API calls — consuming tokens, potentially accessing sensitive data — with no corresponding source code, deployment record, or owner. No static analysis tool finds this. No SIEM alerts on it. AgentDiscover S Capability contract not published. No trust telemetry is available yet. 10 GitHub stars reported by the source. Last updated 4/15/2026.
Freshness
Last checked 4/15/2026
Best For
agent-discover-scanner is best for crewai, multi-agent workflows where OpenClaw compatibility matters.
Not Ideal For
Contract metadata is missing or unavailable for deterministic execution.
Evidence Sources Checked
editorial-content, GITHUB REPOS, runtime-metrics, public facts pack
The industry-standard Agentic Identity & Inventory Scanner. Automatically inventory autonomous agents (LangChain, AutoGen, CrewAI, PydanticAI) using static analysis, network heuristics, and eBPF. Foundational tool for AIBOM compliance and AgentOps governance. AgentDiscover Scanner **Open-Source AI Agent Discovery for the Enterprise** $1 $1 $1 $1 *Part of the $1 platform for autonomous AI governance* --- The finding that matters A GHOST agent is an AI system making real API calls — consuming tokens, potentially accessing sensitive data — with no corresponding source code, deployment record, or owner. No static analysis tool finds this. No SIEM alerts on it. AgentDiscover S
Public facts
5
Change events
1
Artifacts
0
Freshness
Apr 15, 2026
Capability contract not published. No trust telemetry is available yet. 10 GitHub stars reported by the source. Last updated 4/15/2026.
Trust score
Unknown
Compatibility
OpenClaw
Freshness
Apr 15, 2026
Vendor
Defend Ai Tech Inc
Artifacts
0
Benchmarks
0
Last release
Unpublished
Key links, install path, and a quick operational read before the deeper crawl record.
Summary
Capability contract not published. No trust telemetry is available yet. 10 GitHub stars reported by the source. Last updated 4/15/2026.
Setup snapshot
Setup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.
Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.
Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.
Vendor
Defend Ai Tech Inc
Protocol compatibility
OpenClaw
Adoption signal
10 GitHub stars
Handshake status
UNKNOWN
Crawlable docs
6 indexed pages on the official domain
Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.
Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.
Extracted files
0
Examples
6
Snippets
0
Languages
python
text
$ agent-discover-scanner scan-all ./your-repo --duration 10 🔍 Scanning for autonomous AI agents... 📂 Analyzing source code at ./your-repo 🌐 Monitoring live network connections... Observing runtime behavior (10s)... 🔗 Correlating findings... ✓ Correlation complete 🤖 Autonomous Agent Inventory ┏━━━━━━━━━━━━━━━━┳━━━━━━━┳━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┓ ┃ Classification ┃ Count ┃ Description ┃ ┡━━━━━━━━━━━━━━━━╇━━━━━━━╇━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┩ │ CONFIRMED │ 2 │ Active — detected in code and observed at runtime │ │ UNKNOWN │ 3 │ Code found — not yet observed at runtime │ │ SHADOW AI │ 3 │ Known app using AI — review for governance │ │ ZOMBIE │ 0 │ Inactive — code exists but no recent runtime activity │ │ GHOST │ 1 │ ⚠ Critical — runtime activity with no source code (ungoverned) │ └────────────────┴───────┴────────────────────────────────────────────────────────────────┘
text
👻 GHOST AGENT DETECTED Workload: trading-bot (Deployment/default) Connected: api.openai.com — LIVE SaaS: openai — confirmed active connection Source code: None found in scanned repositories Owner: Unknown — no deployment record, no code review 👻 GHOST AGENT DETECTED Workload: shadow-agent (Pod/kube-system) Connected: api.anthropic.com — LIVE SaaS: anthropic — confirmed | gcp — active socket Blast radius: HIGH (cloud provider access confirmed) Source code: None found in scanned repositories Owner: Unknown — no deployment record, no code review
text
crewai-agent (CONFIRMED)
saas_connections:
anthropic: confirmed ← active_connection observed
github: medium ← open socket
risk_flags: [cloud_credentials_present]
blast_radius: 70/100bash
# macOS (recommended) brew install python@3.12 osquery pipx pipx install agent-discover-scanner pipx ensurepath && source ~/.zshrc # add ~/.local/bin to PATH # Linux (Debian/Ubuntu) sudo apt-get install -y python3 osquery pip3 install agent-discover-scanner # Linux (RHEL/Fedora) sudo dnf install -y python3 osquery pip3 install agent-discover-scanner # Windows (PowerShell — elevated) winget install Python.Python.3.12 winget install osquery.osquery pip install agent-discover-scanner
bash
agent-discover-scanner scan-all ~/projects --duration 30
bash
agent-discover-scanner --version osquery --version which agent-discover-scanner # macOS: should show ~/.local/bin/agent-discover-scanner
Full documentation captured from public sources, including the complete README when available.
Docs source
GITHUB REPOS
Editorial quality
ready
The industry-standard Agentic Identity & Inventory Scanner. Automatically inventory autonomous agents (LangChain, AutoGen, CrewAI, PydanticAI) using static analysis, network heuristics, and eBPF. Foundational tool for AIBOM compliance and AgentOps governance. AgentDiscover Scanner **Open-Source AI Agent Discovery for the Enterprise** $1 $1 $1 $1 *Part of the $1 platform for autonomous AI governance* --- The finding that matters A GHOST agent is an AI system making real API calls — consuming tokens, potentially accessing sensitive data — with no corresponding source code, deployment record, or owner. No static analysis tool finds this. No SIEM alerts on it. AgentDiscover S
Open-Source AI Agent Discovery for the Enterprise
Part of the DefendAI platform for autonomous AI governance
$ agent-discover-scanner scan-all ./your-repo --duration 10
🔍 Scanning for autonomous AI agents...
📂 Analyzing source code at ./your-repo
🌐 Monitoring live network connections...
Observing runtime behavior (10s)...
🔗 Correlating findings...
✓ Correlation complete
🤖 Autonomous Agent Inventory
┏━━━━━━━━━━━━━━━━┳━━━━━━━┳━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┓
┃ Classification ┃ Count ┃ Description ┃
┡━━━━━━━━━━━━━━━━╇━━━━━━━╇━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┩
│ CONFIRMED │ 2 │ Active — detected in code and observed at runtime │
│ UNKNOWN │ 3 │ Code found — not yet observed at runtime │
│ SHADOW AI │ 3 │ Known app using AI — review for governance │
│ ZOMBIE │ 0 │ Inactive — code exists but no recent runtime activity │
│ GHOST │ 1 │ ⚠ Critical — runtime activity with no source code (ungoverned) │
└────────────────┴───────┴────────────────────────────────────────────────────────────────┘
A GHOST agent is an AI system making real API calls — consuming tokens, potentially accessing sensitive data — with no corresponding source code, deployment record, or owner. No static analysis tool finds this. No SIEM alerts on it. AgentDiscover Scanner finds it in under 60 seconds by watching the runtime and cross-referencing it against your codebase simultaneously.
Your engineering team thinks they know what AI is running. The GHOST classification is what they don't know.
Most security tools tell you what's in your code. AgentDiscover Scanner tells you what's actually running — and crucially, what's running that has no business being there.
👻 GHOST AGENT DETECTED
Workload: trading-bot (Deployment/default)
Connected: api.openai.com — LIVE
SaaS: openai — confirmed active connection
Source code: None found in scanned repositories
Owner: Unknown — no deployment record, no code review
👻 GHOST AGENT DETECTED
Workload: shadow-agent (Pod/kube-system)
Connected: api.anthropic.com — LIVE
SaaS: anthropic — confirmed | gcp — active socket
Blast radius: HIGH (cloud provider access confirmed)
Source code: None found in scanned repositories
Owner: Unknown — no deployment record, no code review
Every detected agent also carries a SaaS blast radius — a live-observed map of which services it's actively connected to, derived from network traffic, not just configuration files:
crewai-agent (CONFIRMED)
saas_connections:
anthropic: confirmed ← active_connection observed
github: medium ← open socket
risk_flags: [cloud_credentials_present]
blast_radius: 70/100
confirmed means the connection was live-observed during the scan — not inferred from a config file.
| Classification | What it means | Risk | | ----------------- | ------------------------------------------ | ------------ | | 👻 GHOST | Runtime AI activity — no source code found | Critical | | ✅ CONFIRMED | Detected in code AND observed running | High | | ⚠️ UNKNOWN | Found in code, not yet observed at runtime | Medium | | 🖥️ SHADOW AI | Known app using AI without governance | Medium | | ☠️ ZOMBIE | Was active, no longer observed | Low |
# macOS (recommended)
brew install python@3.12 osquery pipx
pipx install agent-discover-scanner
pipx ensurepath && source ~/.zshrc # add ~/.local/bin to PATH
# Linux (Debian/Ubuntu)
sudo apt-get install -y python3 osquery
pip3 install agent-discover-scanner
# Linux (RHEL/Fedora)
sudo dnf install -y python3 osquery
pip3 install agent-discover-scanner
# Windows (PowerShell — elevated)
winget install Python.Python.3.12
winget install osquery.osquery
pip install agent-discover-scanner
macOS: never use
sudowith the installer — Homebrew refuses root and osquery silently fails. Usepipxto avoid Python environment conflicts. Ifagent-discover-scanneris not found after install, runpipx ensurepathand restart your terminal.
Then run your first scan:
agent-discover-scanner scan-all ~/projects --duration 30
To verify all layers are working before your first real scan:
agent-discover-scanner --version
osquery --version
which agent-discover-scanner # macOS: should show ~/.local/bin/agent-discover-scanner
To upload results to the DefendAI platform:
agent-discover-scanner scan-all ~/projects \
--platform \
--api-key YOUR_API_KEY
AgentDiscover Scanner runs four detection layers simultaneously and correlates them into a single agent inventory. Each layer sees something the others can't.
Static analysis of Python and JavaScript/TypeScript. Detects LangChain, LangGraph, CrewAI, AutoGen, direct OpenAI/Anthropic/Gemini API usage, and any HTTP client targeting LLM endpoints. Handles import aliasing and indirect usage patterns. Generates SARIF output for CI/CD integration.
Passive observation of outbound connections to AI providers — OpenAI, Anthropic, Google Gemini, Mistral, Cohere, Azure OpenAI, AWS Bedrock, and vector stores. No packet capture. Identifies which process is making each connection, enabling per-agent SaaS attribution.
Real scan output:
[DETECT] Google AI connection from Mail (PID: 776) → generativelanguage.googleapis.com:993
[DETECT] OpenAI connection from Microsoft Edge Helper (PID: 4172) → api.openai.com:443
[DETECT] Anthropic connection from Cursor Helper (PID: 61436) → api.anthropic.com:443
[DETECT] OpenAI connection from OneDrive (PID: 96089) → api.openai.com:443
Kernel-level visibility into pod behavior via Tetragon. Identifies which workloads are actively making AI calls — including workloads with no corresponding source code. Works with any CNI. Falls back to Kubernetes API discovery if Tetragon is unavailable.
When Layer 1 (code) and Layer 3 (K8s runtime) both detect the same agent, it becomes CONFIRMED:
Detection Coverage:
┏━━━━━━━━━━━━━━━┳━━━━━━━━┓
┃ Layers ┃ Agents ┃
┡━━━━━━━━━━━━━━━╇━━━━━━━━┩
│ layer1,layer3 │ 2 │ ← CONFIRMED: seen in code AND running in K8s
│ layer1 │ 3 │ ← UNKNOWN: code found, not yet observed at runtime
└───────────────┴────────┘
Layer 3 (eBPF via Tetragon) is Linux-only. On macOS and Windows developer machines, Layer 3 is skipped automatically — the scan continues with Layers 1, 2, and 4. The K8s API monitor path works on all platforms and requires only kubectl with cluster read access.
Scans developer machines, CI/CD runners, and workstations via osquery. Finds installed AI packages, desktop AI applications (ChatGPT Desktop, Claude Desktop, Cursor, GitHub Copilot), active connections, browser-based AI usage, and VSCode extensions.
After all layers run, the correlator builds a unified agent identity. An agent seen in code (Layer 1), confirmed running in K8s (Layer 3), and observed making network calls (Layer 2) is a single correlated identity — not three separate findings.
Agents present at runtime with no Layer 1 match become GHOST agents.
After correlation, each agent receives a saas_connections profile built from all four layers:
{
"detected": ["anthropic", "gcp", "github"],
"confirmed": ["anthropic"],
"evidence": {
"anthropic": ["active_connection", "open_socket"],
"gcp": ["open_socket"],
"github": ["vscode_extension_detected"]
},
"confidence": {
"anthropic": "confirmed",
"gcp": "medium",
"github": "medium"
},
"has_cloud_provider": true,
"has_llm_provider": true
}
The scanner detects autonomous agent platforms that carry systemic security risk by design — not misconfigurations, but architecture.
OpenClaw (formerly Clawdbot/Moltbot) is the primary target. It has full filesystem access, terminal execution, email and messaging integration, and runs as a persistent background daemon. CVE-2026-25253 CVSS 8.8. Gartner: "insecure by default." Microsoft: "treat as untrusted code execution."
Detection uses corroborated signals — never a single port number:
🚨 HIGH-RISK AGENT CONFIRMED: OpenClaw
Autonomous agent with system-level access — filesystem,
terminal, email, and messaging integration.
Capabilities: filesystem, terminal, email, browser, messaging
MCP (Model Context Protocol) is the integration layer between AI agents and enterprise SaaS. Supported by Claude, ChatGPT, Gemini, Copilot, Cursor, and VS Code.
The scanner detects MCP servers across all AI clients and classifies each by publisher verification:
⚠ Local MCP script detected — unknown code with tool access
⚠ Unverified MCP server: filesystem (Community/Unknown) — not from a verified publisher
⚠ Unverified MCP server: mcpfw (Unknown) — not from a verified publisher
✓ Verified: @salesforce/mcp-server (Salesforce official)
Supported clients: Claude Desktop, Cursor, Windsurf, VS Code, Gemini CLI, OpenAI Codex, Continue.dev, Zed, and project-level MCP configs.
Non-developer detection: Financial analysts connecting ChatGPT Teams to Salesforce via UI leave no local config file. The scanner detects this via Layer 2 network traffic — the only tool that catches this pattern.
Risk prioritization in reporting (guidance):
Run continuously as a background service, updating the agent inventory every 30 seconds:
agent-discover-scanner scan-all ~/projects \
--daemon \
--output ~/defendai-results \
--platform \
--platform-interval 5 # upload to platform every ~2.5 minutes
Note:
--daemonruns until you press Ctrl+C. Use--output ~/defendai-results(or any user-writable path) — avoid/var/log/which requires root. If running as root,~/projectsresolves to root's home directory, not yours. Always run withoutsudo.
With --platform, the daemon syncs to the DefendAI platform every N correlation cycles (default: every 5 cycles ≈ 2.5 minutes) and always uploads a final snapshot on shutdown.
Linux — install as a systemd service:
sudo bash deployment/systemd/install-service.sh ~/projects
systemctl status defendai-scanner
By default, the scanner classifies common desktop applications (browsers, Office 365, Cursor, Slack, Claude Desktop, etc.) as Shadow AI rather than GHOST when they make AI API calls.
Browser-based AI usage (claude.ai, chatgpt.com, copilot.microsoft.com) is detected via Layer 4 browser history — these are classified as Shadow AI automatically. Note that Layer 4 reads the browser's committed history database, not the current active session, so a tab open right now may not appear until the browser flushes its history.
To add your own internal tools:
mkdir -p ~/.defendai
echo "my-internal-ai-tool" >> ~/.defendai/known_apps.txt
echo "company-llm-client" >> ~/.defendai/known_apps.txt
See docs/known-apps-example.txt for the full format.
When connected to the DefendAI platform (--platform flag), the tenant-managed list is downloaded automatically on startup and merged with your local overrides.
The scanner is the discovery layer. The platform is where discovered agents become governed agents.
agent-discover-scanner scan-all ~/projects \
--platform \
--api-key YOUR_KEY \
--duration 30
When connected to the platform, each scan triggers the correlation engine which builds a living identity map across every machine, every environment, and every scan:
has_code_execution=true since last week? That's a signal. Platform tracks it.After a few scans, the DefendAI platform report shows:
Agent Inventory Report — acme-corp
─────────────────────────────────────────────────────────────────────
shadow-agent GHOST CRITICAL anthropic, github blast: 85 machines: 3
↑ GHOST seen in production — immediate action required
crewai-agent SHADOW MEDIUM openai blast: 25 machines: 1
↑ Unreviewed — no governance record
langchain-agent KNOWN LOW openai blast: 15 machines: 1
↑ Approved — monitoring active
─────────────────────────────────────────────────────────────────────
3 agents total · 1 critical · 1 unreviewed · 1 governed
# .github/workflows/agent-scan.yml
- name: Scan for AI agents (Layer 1 — source code)
run: |
pip install agent-discover-scanner
agent-discover-scanner scan . --format sarif --output results.sarif
- name: Upload SARIF to GitHub Security tab
uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: results.sarif
For a full-stack scan in CI (all layers, structured output):
- name: Full agent scan
run: |
agent-discover-scanner scan-all . \
--duration 30 \
--output ./defendai-results \
--skip-layers 3 # skip K8s layer in CI — no cluster available
# Note: Layer 3 (eBPF/Tetragon) is Linux-only. Layer 2 requires elevated privileges on Linux.
# Full scan (recommended) — all 4 layers + correlation
agent-discover-scanner scan-all PATH [OPTIONS]
--duration/-d SECONDS Network and K8s monitor observation window [default: 60]
--output/-o PATH Output directory for scan results [default: defendai-results]
--format/-f TEXT Output format: text|json [default: text]
(SARIF output is written to disk by Layer 1 as layer1_code.sarif)
--layer3-file PATH Use existing Tetragon JSONL output (skip live Layer 3)
--skip-layers TEXT Comma-separated layers to skip, e.g. '3' or '2,3'
--verbose/-v Include Layer 3 raw event output
--daemon Run continuously, re-scanning every 30 seconds
--platform Upload results to DefendAI platform after scan
--api-key TEXT DefendAI platform API key
--tenant-token TEXT DefendAI platform tenant token
--wawsdb-url TEXT DefendAI platform base URL [default: https://wauzeway.defendai.ai]
--platform-interval INT Upload every N correlation cycles in daemon mode [default: 5]
--max-log-size INT Rotate output files at this size in MB [default: 50]
--max-log-backups INT Rotated backup files to keep [default: 5]
# Individual layers
agent-discover-scanner scan PATH # Layer 1: source code only
agent-discover-scanner deps PATH # Dependency scanning
agent-discover-scanner monitor # Layer 2: network monitor only
agent-discover-scanner monitor-k8s # Layer 3: Kubernetes runtime only
agent-discover-scanner endpoint # Layer 4: endpoint scan only
agent-discover-scanner correlate # Correlate existing scan outputs
# Audit mode (v2.5.0+) — full report: aibom.json, ghost-agents.md, mcp-report.md
agent-discover-scanner audit PATH [OPTIONS]
--duration/-d SECONDS Observation window [default: 60]
--output/-o PATH Report output directory [default: defendai-audit]
--layer3-file PATH Use existing Tetragon JSONL (skip live Layer 3)
--platform Upload to DefendAI platform
--api-key TEXT DefendAI platform API key
# Short alias (v2.5.0+) — same as agent-discover-scanner
agent-discover [COMMAND] [OPTIONS]
AI frameworks: LangChain, LangGraph, CrewAI, AutoGen, direct HTTP LLM clients
LLM providers: OpenAI, Anthropic, Google Gemini / Google AI, Mistral, Cohere, Azure OpenAI, AWS Bedrock, Groq, DeepSeek
Vector stores: Pinecone, Weaviate, Qdrant, Chroma
SaaS blast radius detection (v2.3.0+): Salesforce, Slack, GitHub, GitLab, Jira, HubSpot, Notion, Airtable, Stripe, Twilio, Snowflake, Databricks, AWS, GCP, Azure, PostgreSQL, Redis, MongoDB
git clone https://github.com/Defend-AI-Tech-Inc/agent-discover-scanner
cd agent-discover-scanner/demo
./setup.sh # deploys LangChain, CrewAI, and a shadow agent to local Kubernetes
agent-discover-scanner scan-all ./sample-repo --duration 60
Expected output: 2 CONFIRMED agents (crewai-agent, langchain-agent), 1 GHOST agent (shadow-agent — runtime activity, no source code).
| Capability | Requirement | | ------------------ | -------------------------------------------------------------------------------------------------- | | Code scanning | Python 3.10+, all dependencies included | | Network monitoring | Linux: root/sudo required · macOS: no sudo (use pipx) · Windows: elevated PowerShell | | Kubernetes runtime | kubectl + read access (K8s API path) · Helm 3+ + root/sudo for Tetragon/eBPF (Linux only) | | Endpoint discovery | osquery (optional — graceful degradation if not installed) | | Layer 3 (eBPF) | Linux only — unavailable on macOS and Windows. K8s API path works on all platforms. | | Platform upload | DefendAI API key (defendai.ai) |
Full Kubernetes setup: install.sh handles Helm, runtime monitoring setup, and permissions automatically.
AgentDiscover Scanner is the discovery layer of the DefendAI platform.
| Component | Status | Description | | ------------------------- | -------------- | --------------------------------------------------------------------- | | AgentDiscover Scanner | ✅ Open Source (v2.5.0) | Discover and classify AI agents across your environment | | defendai-agent | 🧪 Beta | MITM proxy for real-time AI traffic inspection and policy enforcement | | Correlation Engine | ✅ Available | Cross-machine identity resolution and behavioral drift detection | | Policy Engine | 🚧 Coming Soon | Define and enforce agent behavior rules | | DefendAI Platform | 💼 Enterprise | Full lifecycle governance for autonomous AI |
defendai.ai · playground.defendai.ai · support@defendai.ai
git clone https://github.com/Defend-AI-Tech-Inc/agent-discover-scanner.git
cd agent-discover-scanner
uv sync
uv run pytest tests/ -v
See CONTRIBUTING.md for guidelines. Issues and PRs welcome.
MIT — free to use, deploy, and modify.
Built by DefendAI · Securing the future of autonomous AI
Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.
Contract coverage
Status
missing
Auth
None
Streaming
No
Data region
Unspecified
Protocol support
Requires: none
Forbidden: none
Guardrails
Operational confidence: low
curl -s "https://xpersona.co/api/v1/agents/crewai-defend-ai-tech-inc-agent-discover-scanner/snapshot"
curl -s "https://xpersona.co/api/v1/agents/crewai-defend-ai-tech-inc-agent-discover-scanner/contract"
curl -s "https://xpersona.co/api/v1/agents/crewai-defend-ai-tech-inc-agent-discover-scanner/trust"
Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.
Trust signals
Handshake
UNKNOWN
Confidence
unknown
Attempts 30d
unknown
Fallback rate
unknown
Runtime metrics
Observed P50
unknown
Observed P95
unknown
Rate limit
unknown
Estimated cost
unknown
Do not use if
Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.
Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.
Rank
70
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Rank
70
AI productivity studio with smart chat, autonomous agents, and 300+ assistants. Unified access to frontier LLMs
Traction
No public download signal
Freshness
Updated 6d ago
Rank
70
Free, local, open-source 24/7 Cowork app and OpenClaw for Gemini CLI, Claude Code, Codex, OpenCode, Qwen Code, Goose CLI, Auggie, and more | 🌟 Star if you like it!
Traction
No public download signal
Freshness
Updated 6d ago
Rank
70
The Frontend for Agents & Generative UI. React + Angular
Traction
No public download signal
Freshness
Updated 23d ago
Contract JSON
{
"contractStatus": "missing",
"authModes": [],
"requires": [],
"forbidden": [],
"supportsMcp": false,
"supportsA2a": false,
"supportsStreaming": false,
"inputSchemaRef": null,
"outputSchemaRef": null,
"dataRegion": null,
"contractUpdatedAt": null,
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Invocation Guide
{
"preferredApi": {
"snapshotUrl": "https://xpersona.co/api/v1/agents/crewai-defend-ai-tech-inc-agent-discover-scanner/snapshot",
"contractUrl": "https://xpersona.co/api/v1/agents/crewai-defend-ai-tech-inc-agent-discover-scanner/contract",
"trustUrl": "https://xpersona.co/api/v1/agents/crewai-defend-ai-tech-inc-agent-discover-scanner/trust"
},
"curlExamples": [
"curl -s \"https://xpersona.co/api/v1/agents/crewai-defend-ai-tech-inc-agent-discover-scanner/snapshot\"",
"curl -s \"https://xpersona.co/api/v1/agents/crewai-defend-ai-tech-inc-agent-discover-scanner/contract\"",
"curl -s \"https://xpersona.co/api/v1/agents/crewai-defend-ai-tech-inc-agent-discover-scanner/trust\""
],
"jsonRequestTemplate": {
"query": "summarize this repo",
"constraints": {
"maxLatencyMs": 2000,
"protocolPreference": [
"OPENCLEW"
]
}
},
"jsonResponseTemplate": {
"ok": true,
"result": {
"summary": "...",
"confidence": 0.9
},
"meta": {
"source": "GITHUB_REPOS",
"generatedAt": "2026-04-17T02:46:12.261Z"
}
},
"retryPolicy": {
"maxAttempts": 3,
"backoffMs": [
500,
1500,
3500
],
"retryableConditions": [
"HTTP_429",
"HTTP_503",
"NETWORK_TIMEOUT"
]
}
}Trust JSON
{
"status": "unavailable",
"handshakeStatus": "UNKNOWN",
"verificationFreshnessHours": null,
"reputationScore": null,
"p95LatencyMs": null,
"successRate30d": null,
"fallbackRate": null,
"attempts30d": null,
"trustUpdatedAt": null,
"trustConfidence": "unknown",
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Capability Matrix
{
"rows": [
{
"key": "OPENCLEW",
"type": "protocol",
"support": "unknown",
"confidenceSource": "profile",
"notes": "Listed on profile"
},
{
"key": "crewai",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "multi-agent",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
}
],
"flattenedTokens": "protocol:OPENCLEW|unknown|profile capability:crewai|supported|profile capability:multi-agent|supported|profile"
}Facts JSON
[
{
"factKey": "vendor",
"category": "vendor",
"label": "Vendor",
"value": "Defend Ai Tech Inc",
"href": "https://github.com/Defend-AI-Tech-Inc/agent-discover-scanner",
"sourceUrl": "https://github.com/Defend-AI-Tech-Inc/agent-discover-scanner",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-04-15T06:04:16.083Z",
"isPublic": true
},
{
"factKey": "protocols",
"category": "compatibility",
"label": "Protocol compatibility",
"value": "OpenClaw",
"href": "https://xpersona.co/api/v1/agents/crewai-defend-ai-tech-inc-agent-discover-scanner/contract",
"sourceUrl": "https://xpersona.co/api/v1/agents/crewai-defend-ai-tech-inc-agent-discover-scanner/contract",
"sourceType": "contract",
"confidence": "medium",
"observedAt": "2026-04-15T06:04:16.083Z",
"isPublic": true
},
{
"factKey": "traction",
"category": "adoption",
"label": "Adoption signal",
"value": "10 GitHub stars",
"href": "https://github.com/Defend-AI-Tech-Inc/agent-discover-scanner",
"sourceUrl": "https://github.com/Defend-AI-Tech-Inc/agent-discover-scanner",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-04-15T06:04:16.083Z",
"isPublic": true
},
{
"factKey": "docs_crawl",
"category": "integration",
"label": "Crawlable docs",
"value": "6 indexed pages on the official domain",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
},
{
"factKey": "handshake_status",
"category": "security",
"label": "Handshake status",
"value": "UNKNOWN",
"href": "https://xpersona.co/api/v1/agents/crewai-defend-ai-tech-inc-agent-discover-scanner/trust",
"sourceUrl": "https://xpersona.co/api/v1/agents/crewai-defend-ai-tech-inc-agent-discover-scanner/trust",
"sourceType": "trust",
"confidence": "medium",
"observedAt": null,
"isPublic": true
}
]Change Events JSON
[
{
"eventType": "docs_update",
"title": "Docs refreshed: Sign in to GitHub · GitHub",
"description": "Fresh crawlable documentation was indexed for the official domain.",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
}
]Sponsored
Ads related to agent-discover-scanner and adjacent AI workflows.