Features How It Works Checks Install GitHub ↗ Get Started
Open Source Security Scanner

Security Scanner
for AI Agents

Scan. Fix. Harden. Get a security score out of 100 for your AI agent installation. Detect CVEs, misconfigurations, and exposed secrets in seconds — powered by Bankr LLM Gateway.

takanome — zsh
$ takanome analyze
 
Takanome Security Scan — OpenClaw
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
 
Score: 72/100 (117/163 pts)
 
Authentication 8/12
Gateway auth enabled 4/4
Token auth mode (recommended) 4/4
Auth token strength 0/4
 
Known Vulnerabilities (CVE) 41/51
CVE-2026-28446 (CVSS 9.2) 5/5
CVE-2026-22172 (CVSS 9.9) 0/5
Installed: 2026.2.20 — Fixed: 2026.3.12
 
Takanome AI Analysis — Bankr LLM Gateway
Model: claude-haiku-4.5  ·  Analysing findings...
 
✦ AI Analysis: 2 critical issues found
Upgrade to patch CVE-2026-22172
Rotate auth token (min 32 chars)
 
Run takanome fix to apply remediations
54
Security Checks
18
Categories
27+
LLM Models
0–100
Security Score
Features

Everything You Need to Secure AI Agents

A comprehensive security toolkit built for the AI agent ecosystem.

🔍
CVE Scanning

Cross-references your agent version against known CVEs with CVSS scores, affected version ranges, and patch guidance.

🔧
Auto-Fix

One command to harden your installation. Fixes permissions, generates strong tokens, patches config, and removes dangerous flags.

🔐
Secrets Detection

Scans for hardcoded API keys, tokens, and passwords across 10+ secret patterns including OpenAI, GitHub, AWS, Slack, and more.

AI-Powered Analysis

Leverages 27+ LLMs via Bankr LLM Gateway for human-readable explanations and prioritized fix recommendations.

Single Binary

Built in Rust. Ships as one self-contained binary — no runtime, no dependencies, no Docker required.

🛡️
Config Hardening

Validates 30+ configuration settings against security best practices — auth, sandboxing, network exposure, and more.

How It Works

Three Steps to a Secure Agent

Install, scan, and fix. It takes less than a minute.

1
Install
# Download & extract
unzip Takanome.zip
 
# Install binary
chmod +x takanome
sudo mv takanome /usr/local/bin/
copy
2
Scan
takanome analyze
copy
Score: 72/100
2 critical, 3 warnings
3
Fix
takanome fix
copy
Score: 72/100 → 96/100 (+24)
Applied 8 of 8 fixes.
What It Checks

54 Checks. 18 Categories. 163 Points.

Every check targets a real attack surface. No filler, no vanity metrics.

CategoryChecksPoints
Authentication312
Known Vulnerabilities (CVE)1551
Secrets Management512
File Permissions310
Network Exposure312
Tool Authorization310
Exec Security310
Sandboxing310
DM Security28
Group Security26
Browser Security26
Dangerous Flags16
Logging & Privacy24
mDNS / Discovery12
Control UI22
Plugins12
Total54163
Installation

Install Takanome

Precompiled binary for Linux x86_64. Works on WSL, Ubuntu, Debian, and most Linux distros.

Build from Source
Requires Rust 1.75+. Full control over the build.
git clone https://github.com/
  takanome-app/takanome.git
cd takanome
cargo build --release
copy
Set API Key
Required for AI features. Scanning works offline.
export BANKR_API_KEY=bk_YOUR_KEY
 
# Run your first scan
takanome analyze
copy
Get your key at bankr.bot/api
TAKA

Takanome is TAKA

Star us on GitHub and help secure the AI agent ecosystem.