<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>Cisco | Awesome Agents</title><link>https://awesomeagents.ai/tags/cisco/</link><description>Your guide to AI models, agents, and the future of intelligence. Reviews, leaderboards, news, and tools - all in one place.</description><language>en-us</language><managingEditor>contact@awesomeagents.ai (Awesome Agents)</managingEditor><lastBuildDate>Wed, 01 Apr 2026 13:54:00 +0200</lastBuildDate><atom:link href="https://awesomeagents.ai/tags/cisco/index.xml" rel="self" type="application/rss+xml"/><image><url>https://awesomeagents.ai/images/logo.png</url><title>Awesome Agents</title><link>https://awesomeagents.ai/</link></image><item><title>Cisco DefenseClaw Locks Down AI Agents at RSA</title><link>https://awesomeagents.ai/news/cisco-defenseclaw-open-source-agent-security/</link><pubDate>Wed, 01 Apr 2026 13:54:00 +0200</pubDate><guid>https://awesomeagents.ai/news/cisco-defenseclaw-open-source-agent-security/</guid><description><![CDATA[<div class="podcast-embed">
<iframe style="border-radius:12px" src="https://open.spotify.com/embed/episode/54WmnuDmqqNhyHQyuzKSHe?utm_source=generator&theme=0" width="100%" height="152" frameBorder="0" allowfullscreen="" allow="autoplay; clipboard-write; encrypted-media; fullscreen; picture-in-picture" loading="lazy"></iframe>
</div>
<p>Eighty-five percent of enterprises are experimenting with AI agents. Only 5% have moved them into production. Cisco's own survey delivered that number at RSA 2026, and the company is betting that security - not capability - is the actual blocker.</p>]]></description><content:encoded xmlns:content="http://purl.org/rss/1.0/modules/content/"><![CDATA[<div class="podcast-embed">
<iframe style="border-radius:12px" src="https://open.spotify.com/embed/episode/54WmnuDmqqNhyHQyuzKSHe?utm_source=generator&theme=0" width="100%" height="152" frameBorder="0" allowfullscreen="" allow="autoplay; clipboard-write; encrypted-media; fullscreen; picture-in-picture" loading="lazy"></iframe>
</div>
<p>Eighty-five percent of enterprises are experimenting with AI agents. Only 5% have moved them into production. Cisco's own survey delivered that number at RSA 2026, and the company is betting that security - not capability - is the actual blocker.</p>
<p>On March 27, Cisco released <strong>DefenseClaw</strong> to GitHub under a permissive open-source license. It's a governance layer that sits on top of <a href="/news/nvidia-openshell-agent-sandbox-security/">NVIDIA's OpenShell sandbox</a> and adds scanning, policy enforcement, and supply chain documentation for AI agent deployments. The pitch is five minutes from download to protected agent.</p>
<div class="news-tldr">
<p><strong>TL;DR</strong></p>
<ul>
<li>Cisco open-sourced DefenseClaw on March 27, 2026 - an agent security framework built on NVIDIA OpenShell</li>
<li>Five scanners cover skills, MCP servers, agent-to-agent traffic, produced code, and supply chain inventory</li>
<li>Blocked skills have permissions revoked and files quarantined within 2 seconds, no restart required</li>
<li>Cisco also released AI Defense Explorer Edition (free red-teaming tool) and a LLM Security Leaderboard at RSA 2026</li>
</ul>
</div>
<h2 id="installing-defenseclaw">Installing DefenseClaw</h2>
<p>The install path is intentionally short. DefenseClaw assumes OpenShell is already running as the sandbox layer. From there:</p>
<div class="highlight"><pre tabindex="0" class="chroma"><code class="language-bash" data-lang="bash"><span class="line"><span class="cl"><span class="c1"># Install DefenseClaw</span>
</span></span><span class="line"><span class="cl">curl -LsSf https://raw.githubusercontent.com/cisco-ai-defense/defenseclaw/main/install.sh <span class="p">|</span> sh
</span></span><span class="line"><span class="cl">
</span></span><span class="line"><span class="cl"><span class="c1"># Initialize on an existing OpenShell agent</span>
</span></span><span class="line"><span class="cl">defenseclaw init --agent openclaw
</span></span><span class="line"><span class="cl">
</span></span><span class="line"><span class="cl"><span class="c1"># Run a full scan before first launch</span>
</span></span><span class="line"><span class="cl">defenseclaw scan --all
</span></span></code></pre></div><p>The <code>--all</code> flag triggers all five scanners at once. Individual scanners can be called separately for CI/CD pipelines - DefenseClaw ships with pre-built connectors for GitHub Actions, GitLab, and Jenkins.</p>
<h2 id="what-defenseclaw-scans">What DefenseClaw Scans</h2>
<h3 id="skill-scanner">Skill-Scanner</h3>
<p>Every skill registered to the agent gets inspected before it can be invoked. The scanner checks for known-malicious patterns, unexpected network calls, and permission escalation attempts. It also tracks skill state over time - a clean skill on Tuesday can start exfiltrating data by Thursday, and DefenseClaw is built to catch that drift.</p>
<h3 id="mcp-scanner">MCP-Scanner</h3>
<p>Model Context Protocol servers are increasingly the attack surface of choice for agents. MCP-Scanner verifies each MCP server the agent connects to, applies allow/block list policies, and enforces time-bound access. When you block an MCP server, the policy takes effect within two seconds without requiring an agent restart - permissions are revoked at the OpenShell sandbox layer rather than the application layer.</p>
<h3 id="a2a-scanner">A2A-Scanner</h3>
<p>Agent-to-agent communication is the newest attack surface DefenseClaw addresses. As multi-agent pipelines become more common, an attacker who compromises one agent can use it to inject malicious instructions upstream or downstream. A2A-Scanner monitors message flows between agents and flags anomalies.</p>
<h3 id="codeguard">CodeGuard</h3>
<p>When an agent produces code that it then executes, that code runs through CodeGuard's static analysis engine before execution. This matters more than it sounds: vibe-coded outputs from agents <a href="/news/vibe-coding-security-69-vulnerabilities/">have shown significant security gaps</a>, and most agent frameworks have no gate between generation and execution.</p>
<h3 id="ai-bill-of-materials">AI Bill of Materials</h3>
<p>The AI BoM generator creates a structured inventory of every asset the agent depends on - skills, tools, MCP servers, models, dependencies. This is the supply chain documentation layer. The BoM output integrates directly with Splunk via a prepackaged connector, automatically streaming scan findings, policy decisions, prompt-response pairs, and tool invocations.</p>
<p><img src="/images/news/cisco-defenseclaw-open-source-agent-security-splunk.jpg" alt="DefenseClaw architecture diagram showing three security layers: supply chain scanning, runtime protection, and system boundary enforcement">
<em>DefenseClaw's three-layer security model - supply chain scanning, runtime protection, and system boundary enforcement - as shown in the official Cisco blog.</em>
<small>Source: blogs.cisco.com</small></p>
<h2 id="runtime-policy-enforcement">Runtime Policy Enforcement</h2>
<p>The enforcement model is the technically interesting part. DefenseClaw doesn't just scan once at setup - it monitors continuously during execution. The policy engine runs as a sidecar inside the OpenShell container.</p>
<p>When a skill is blocked:</p>
<ul>
<li>Its sandbox permissions are revoked</li>
<li>Its files are quarantined</li>
<li>The agent receives an error if it tries to invoke the skill</li>
<li>The enforcement event is logged to Splunk with full context</li>
</ul>
<p>All of this happens within two seconds, without stopping the agent process.</p>
<blockquote>
<p>&quot;Projects shelved for lack of resources are now within reach,&quot; said Jeetu Patel, Cisco's Chief Product Officer.</p></blockquote>
<p>The statement is slightly vague, but the underlying point is real: a lot of enterprise agent pilots stall not because the agents are bad but because no one can answer the security team's questions about what the agent is doing and to what.</p>
<h2 id="requirements-and-compatibility">Requirements and Compatibility</h2>
<table>
  <thead>
      <tr>
          <th>Requirement</th>
          <th>Details</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td>Sandbox layer</td>
          <td>NVIDIA OpenShell (required)</td>
      </tr>
      <tr>
          <td>Supported agents</td>
          <td>OpenClaw (native), others via OpenShell</td>
      </tr>
      <tr>
          <td>Splunk</td>
          <td>Optional; connector pre-packaged</td>
      </tr>
      <tr>
          <td>CI/CD</td>
          <td>GitHub Actions, GitLab, Jenkins</td>
      </tr>
      <tr>
          <td>Install time</td>
          <td>Under 5 minutes</td>
      </tr>
      <tr>
          <td>License</td>
          <td>Open source (permissive)</td>
      </tr>
      <tr>
          <td>Repository</td>
          <td>github.com/cisco-ai-defense/defenseclaw</td>
      </tr>
  </tbody>
</table>
<h2 id="the-rest-of-the-rsa-bundle">The Rest of the RSA Bundle</h2>
<p>DefenseClaw wasn't the only release. Cisco shipped three other security tools with it.</p>
<p><strong>AI Defense: Explorer Edition</strong> is a free self-service platform for red-teaming AI models and applications before deployment. It runs multi-turn adversarial tests to find prompt injection and jailbreak vulnerabilities, and integrates into CI/CD pipelines so developers can gate releases on security test results. It's essentially a free entry point to Cisco's broader AI Defense suite, with an upgrade path to enterprise RBAC for teams.</p>
<p><strong>Zero Trust Access for Agents</strong> extends Cisco's Duo IAM to register AI agents as identities with human owners. The idea is that agents should have the same lifecycle management as human employees - provisioning, access scoping, and deprovisioning. Cisco Identity Intelligence then maps agentic identities across the environment for visibility.</p>
<p><strong>LLM Security Leaderboard</strong> ranks language models against adversarial attacks - prompt injection resistance, jailbreak robustness, and related dimensions. It's a free resource. The methodology disclosure is limited at launch, which makes the rankings harder to interpret, but the intent is to give teams an independent signal on model security posture beyond the usual capability benchmarks.</p>
<p><img src="/images/news/cisco-defenseclaw-open-source-agent-security-explorer.jpg" alt="Cisco AI Defense Explorer Edition risk assessment report UI showing model security evaluation results">
<em>The AI Defense Explorer Edition report view - results from multi-turn adversarial testing against a model or agentic application.</em>
<small>Source: blogs.cisco.com</small></p>
<h2 id="where-it-falls-short">Where It Falls Short</h2>
<p>DefenseClaw is genuinely useful, but it has real dependencies and gaps worth noting.</p>
<p><strong>OpenShell lock-in.</strong> DefenseClaw requires NVIDIA OpenShell as the underlying sandbox. If you're running agents on a different runtime - containerized but not OpenShell, or cloud-hosted with a different isolation model - DefenseClaw doesn't currently support that path. The roadmap hints at broader compatibility but it isn't shipping now.</p>
<p><strong>A2A-Scanner is early.</strong> Agent-to-agent communication security is still an active research area. The A2A-Scanner exists, which puts Cisco ahead of most tooling, but the threat models for multi-agent pipelines aren't fully standardized yet. Treat A2A-Scanner as a useful starting point, not a complete solution.</p>
<p><strong>LLM Leaderboard opacity.</strong> The security leaderboard needs more methodological transparency to be trustworthy. Benchmark names, prompt injection test sets, and evaluation conditions aren't published yet. A ranking without reproducible methodology is marketing dressed as measurement.</p>
<p><strong>Enterprise timeline.</strong> Most of Cisco's additional features - Exposure Analytics, the specialized SOC agents, Guided Response - don't reach general availability until April through June 2026. DefenseClaw itself is available now, but the full vision requires waiting on the broader Splunk integration work.</p>
<p>The 85% to 5% gap Cisco cites is real. DefenseClaw addresses a genuine missing layer in most agentic deployments. Whether the OpenShell dependency is a dealbreaker depends on your existing infrastructure - if you're already using <a href="/news/nvidia-openshell-agent-sandbox-security/">NVIDIA's OpenShell</a>, this is a direct install with immediate value.</p>
<hr>
<p><strong>Sources:</strong></p>
<ul>
<li><a href="https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2026/m03/cisco-reimagines-security-for-the-agentic-workforce.html">Cisco Newsroom: Reimagines Security for the Agentic Workforce</a></li>
<li><a href="https://siliconangle.com/2026/03/23/cisco-debuts-new-ai-agent-security-features-open-source-defenseclaw-tool/">SiliconAngle: Cisco debuts DefenseClaw</a></li>
<li><a href="https://blogs.cisco.com/ai/cisco-announces-defenseclaw">Cisco Blog: I Run OpenClaw at Home</a></li>
<li><a href="https://github.com/cisco-ai-defense/defenseclaw">DefenseClaw GitHub</a></li>
<li><a href="https://www.networkworld.com/article/4148823/cisco-goes-all-in-on-agentic-ai-security.html">Network World: Cisco goes all in on agentic AI security</a></li>
</ul>
]]></content:encoded><dc:creator>Sophie Zhang</dc:creator><category>News</category><media:content url="https://awesomeagents.ai/images/news/cisco-defenseclaw-open-source-agent-security_hu_b74a5d838e5edd5a.jpg" medium="image" width="1200" height="675"/><media:thumbnail url="https://awesomeagents.ai/images/news/cisco-defenseclaw-open-source-agent-security_hu_b74a5d838e5edd5a.jpg" width="1200" height="675"/></item></channel></rss>