FORIS / CRYPTO.COM

Building AI Agents Right

Clement Wong
Director, Solutions Engineering COE, APAC — Cloudflare
May 2026
Architecture is the trust model.
THE LANDSCAPE

OpenClaw went from zero to 145K GitHub stars in weeks.
Security couldn't keep up.

7+
CVEs in 8 weeks
 
341
malicious skills in registry
12% of all skills audited
40,214
exposed instances
63% running unpatched versions
$16M
fake token market cap
AI-agent-fueled rug pull
The window is collapsing
CVE-25253
one-click RCE
ClawHavoc
supply chain attack
Mythos finds
27-year-old vuln
Today
Discovery → exploitation is now faster than discovery → patch.
WHY THIS MATTERS FOR YOUR PLATFORM

Every attack that hit OpenClaw will target your platform —
with higher stakes.

💰
Financial access
OpenClaw agents could read files and post messages. Your agents may execute trades, transfer assets, manage wallets. Prompt injection in a general agent is a data leak. In a financial agent, it's asset movement.
⚖️
Regulatory exposure
OpenClaw had no compliance obligations. You're MAS-regulated as a DTSP. And in January, Singapore's IMDA released the world's first governance framework specifically for agentic AI — covering agent autonomy, auditability, and human oversight. Dual compliance.
🎯
Target profile
The $CLAWD token was a $16M rug pull powered entirely by AI agent hype. Your platform sits at the intersection of crypto value and AI automation — which means you'll be targeted from day one by adversaries who already know the playbook.
The question isn't whether to build agents. It's whether the architecture is ready when the first incident happens.
THE REFERENCE ARCHITECTURE

Every agent needs a control plane.
Three capabilities. One architectural layer.

Trading Agent
Customer Agent
Compliance Agent
CONTROL PLANE
CONNECT
Per-agent identity · JIT credentials · mTLS
SCOPE
Tool registry · Sandboxed execution · HITL gates
OBSERVE
Audit trail · Session replay · Anomaly detection
LLMs
APIs
Data
Core discipline: Least agency — an agent can only reach what's explicitly granted
Core discipline: Strong observability — if you can't see it, you can't trust it
Core discipline: Infrastructure-enforced — the guarantee lives in the layer, not the code
THE COVERAGE MODEL

The architecture covers specific risks.
Some things need platform governance.

🛡️
Edge — at request time
Prompt injection detection — scored 1–99, threshold-triggered
Unsafe content filtering (PII, prohibited topics)
Rate limiting and abuse detection
AI Security for Apps
⚙️
Control plane — in transit
Per-agent identity enforcement
Tool registry + sandboxed execution
Full observability + replay + anomaly alerts
AI Gateway + Workers + Zero Trust
🏗️
Platform governance — needs you
Skill/supply chain vetting — no automated solution at scale yet
Agent memory integrity — persistent state across sessions
Behavioral baselines — what "normal" looks like for your agents
Your platform layer
Get the edge and control plane right for maximum leverage —
then invest in governance for what's left.
THE FORK IN THE ROAD

There are two paths for agent architecture.
Everything depends on which one you choose.

PATH A — The default
Shared credentials per host
Code-enforced security (bypassable)
No audit trail by default
Blast radius = entire system
Result
7+ CVEs in 8 weeks · 12% malware rate · $16M rug pull
VS
PATH B — The control plane
Per-agent identity with JIT credentials
Infrastructure-enforced (cannot bypass)
Native audit trail, full replay
Blast radius = one credential
Result
Contained incidents · regulator-ready · auditable by design
You're building from scratch. You get to choose which path your architecture follows.
THE DESIGN DISCIPLINES

Three principles that make Path B work.
Not products. Architecture decisions.

1
Least agency — constrain what an agent can do by default
Every agent starts with zero permissions. Tools, data, and models are granted explicitly. The default state is locked down — you open access deliberately, case by case. Path A gave agents everything and hoped the model behaved. Path B assumes the opposite.
Q: Is a new agent granted anything by default on your platform?
2
Strong observability — see everything before you need to
If you can't replay an agent's session from last Tuesday, you don't have observability — you have hope. Every prompt, every tool call, every response is logged natively. The IMDA framework explicitly calls for audit trails that allow full reconstruction of agent activity.
Q: Can you reconstruct any agent's full session from 30 days ago?
3
Infrastructure-enforced — the guarantee isn't in the code
Code can be manipulated. APIs can be forged. Prompt injection can override instructions. The only guarantees that hold under attack are enforced at the infrastructure layer — before agent code ever executes. HITL for financial actions goes here, not in the UI.
Q: If an agent is compromised, can your infrastructure prevent the damage?
CLOUDFLARE'S ROLE

Capabilities that realize Path B.
Shipping today, not on a roadmap.

Edge security
Prompt injection detection at the WAF layer
AI Security for Apps
Control plane
Routing, observability, cost controls
AI Gateway
Execution sandbox
Isolated per-agent compute with scoped bindings
Workers + Sandboxes GA
Agent identity
JIT credentials, mTLS, per-agent authentication
Zero Trust
Network segmentation
Private mesh, Shadow MCP Detection
Mesh + Shadow MCP
All announced at Cloudflare Agents Week, April 2026 — general availability.
THE FIRST 90 DAYS

Three decisions that determine which path you're on.
Start here. Everything else follows.

1
Agent identity in the protocol
30-day decision. Every agent handler gets its own credential at registration. Short-lived. Scoped to one task. Revocable independently. This is the single decision that determines your blast radius. The IMDA framework starts here — bounded autonomy begins with bounded identity.
2
Audit schema before code
60-day decision. Define what every log entry contains before you write your first agent handler. Task ID. Agent ID. Tool. Parameters. Timestamp. Outcome. Defined now → native audit trail. Added later → approximate. The IMDA framework requires reconstructable audit trails across the agent lifecycle.
3
HITL at the infrastructure layer for financial actions
90-day decision. Any action with financial consequence requires explicit human approval before execution — enforced at the infrastructure level, not in the UI. UI can be bypassed. Code can be manipulated. Infrastructure enforcement is the only kind that holds. This is the line between an agentic platform and a liability.
Architecture is the trust model.
The first 90 days determine which path you're on.
The choice is yours. Everything else follows.