BitsLab Deep Production: Nanobot User Security Practice Guide
When an AI Agent possesses system-level capabilities such as shell execution, file read/write, network requests, and scheduled tasks, it is no longer just a "chatbot"—it becomes an operator with real permissions. This means that a command induced by prompt injection could delete critical data; a skill poisoned by the supply chain could quietly leak credentials; an unverified business operation could cause irreversible losses.
Traditional security solutions often fall into two extremes: either completely relying on the AI's own "judgment" for self-restraint (which can easily be bypassed by carefully crafted prompts), or piling up a large number of rigid rules to lock down the Agent (thereby losing the core value of the Agent).
BitsLab's in-depth guide chooses a third path: dividing security responsibilities based on "who checks," allowing three types of roles to each play their part------
Ordinary Users: As the final line of defense, responsible for key decisions and regular reviews. We provide considerations to reduce cognitive load.
The Agent itself: Consciously adhering to behavioral norms and audit processes during runtime. We provide Skills to inject security knowledge into the Agent's context.
Deterministic Scripts: Mechanically and faithfully executing checks, unaffected by prompt injection. We provide Scripts that cover common known dangerous patterns.
No single checker is omnipotent. Scripts cannot understand semantics, Agents may be deceived, and humans can experience fatigue. But the combination of the three ensures both convenience for daily use and prevention of high-risk operations.
1. Ordinary Users (Considerations)
Users are the final line of defense in the security system and the highest authority. Below are security matters that users need to pay attention to and execute personally.
a) API Key Management
Configuration files should be set with appropriate permissions to prevent unauthorized viewing:
Never submit API keys to code repositories!
b) Channel Access Control (Very Critical!)
- Be sure to set a whitelist (
allowFrom) for each communication channel; otherwise, anyone can chat with your Agent:
⚠️ In the new version, an empty allowFrom means denying all access. If you want to open it, you must explicitly write ["*"], but this is not recommended.
c) Do not run with root privileges
- It is recommended to create a dedicated user to run the Agent to avoid excessive permissions:
d) Avoid using email channels
- Email protocols are complex and relatively risky. Our BitsLab team has discovered and confirmed a critical-level vulnerability related to email. Below is the project party's response; we still have several questions pending confirmation from the project party, so use email-related features with caution.
e) It is recommended to deploy in Docker
- It is recommended to deploy the nanobot in a Docker container, isolating it from the daily usage environment to avoid security risks caused by permission or environment mixing.
2. Tool Installation Steps
Below are the tools independently developed by BitsLab, with specific links: https://github.com/BitsLabSec/nanobot-security-guide
① Download the nanobot-security-guide project to the nanobot skills directory, or send a command to the agent to run the official installation script:
curl -sSL https://raw.githubusercontent.com/BitsLabSec/nanobot-security-guide/main/install.sh | bash
↓
② After installation, read the security practice guidelines in the project (such as README.md, SKILL.md) to understand core security configurations and operational recommendations.
↓
③ Send a command to your Agent: "Please carefully read this security guide and assess whether it is reliable?"
↓
④ Manually configure allowlist.txt and runtime-baseline.txt in the policy directory according to the document prompts to narrow permissions, set security baselines, and other measures.
↓
⑤ You can use the scripts in the scripts/ directory for security inspections and testing to ensure environmental safety.
3. Tool Principles
SKILL.md
The intent review based on cognitive awakening breaks through the blind spot of traditional AI passively receiving commands. It incorporates a mandatory "Self-Wakeup" thought chain mechanism, requiring the AI to first awaken an independent security review persona in the background before processing any user requests. By analyzing user intent contextually and independently, it actively identifies and intercepts potential high-risk threats, upgrading from "mechanical execution" to "intelligent firewall." When malicious commands (such as reverse shell, sensitive file theft, large-scale deletion, etc.) are detected, the tool executes a standardized hard interception protocol (outputting [Bitslab nanobot-sec skills detected sensitive operations..., intercepted] warning).
Malicious Command Execution Interception (Shell & Cron Protection)
Acts as a "zero trust" gateway when the Agent executes system-level commands. The defense line directly blocks various destructive operations and dangerous payloads (such as rm -rf malicious deletions, permission tampering, reverse shells, etc.). At the same time, the tool has built-in deep runtime inspection capabilities that can actively scan and clean persistent backdoors and malicious execution features in system processes and Cron scheduled tasks, ensuring absolute safety of the local environment.
Sensitive Data Theft Blocking (File Access Verification)
Implements strict physical isolation for core assets' read and write operations. The system has preset stringent file verification rules, prohibiting the AI from unauthorized reading of sensitive files such as config.json, .env, etc., which contain API keys and core configurations, and transmitting them externally. In addition, the security engine will also audit file read logs in real-time (such as the call sequence of the read_file tool), completely cutting off the possibility of credential leakage and data exfiltration from the source.
MCP Skill Security Audit
For MCP-type skills, the tool will automatically audit their contextual interactions and data processing logic, detecting risks such as sensitive information leakage, unauthorized access, and dangerous command injection, and comparing them with security baselines and whitelists.
New Skill Download and Automatic Security Scanning
When downloading new skills, the tool will automatically perform static code analysis using audit scripts, compare security baselines and whitelists, and detect sensitive information and dangerous commands, ensuring that skills are loaded only after confirming their safety and compliance.
Tamper-Proof Hash Baseline Verification
To ensure absolute zero trust for the underlying system assets, the protection shield will continuously establish and maintain SHA256 encrypted signature baselines for key configuration files and memory nodes. The nightly inspection engine will automatically verify the temporal changes of each file hash, capable of capturing any unauthorized tampering or privilege escalation in milliseconds, completely cutting off local backdoor implantation and "poisoning" risks from the physical storage layer.
Automated Disaster Recovery Backup Snapshot Rotation
Given that the local Agent has extremely high read and write permissions on the file system, the system has built-in the highest level of automated disaster recovery mechanisms. The protection engine will automatically trigger a full sandbox-level archive of the active workspace every night, generating a security snapshot mechanism with a maximum retention of 7 days (automatically rotating). Even in extreme cases of accidental damage or deletion, it can achieve lossless one-click rollback of the development environment, maximizing the continuity and resilience of local digital assets.
4. Disclaimer
This guide serves only as a reference for security practices and does not constitute any form of security guarantee.
No Absolute Security: All measures described in this guide (including deterministic scripts, Agent Skills, and user considerations) are "best effort" protections and cannot cover all attack vectors. AI Agent security is a rapidly evolving field, and new attack methods may emerge at any time.
User Responsibility: Users deploying and using Nanobot should assess the security risks of their operating environment and adjust the recommendations in this guide according to actual scenarios. Any losses resulting from incorrect configuration, failure to update in a timely manner, or ignoring security warnings are the user's responsibility.
Not a Substitute for Professional Security Audits: This guide cannot replace professional security audits, penetration testing, or compliance assessments. For scenarios involving sensitive data, financial assets, or critical infrastructure, it is strongly recommended to hire a professional security team for independent evaluation.
Third-Party Dependencies: The security of third-party libraries, API services, and platforms (such as Telegram, WhatsApp, LLM providers, etc.) that Nanobot relies on is outside the control of this guide. Users should pay attention to the security announcements of relevant dependencies and update them in a timely manner.
Scope of Liability: The maintainers and contributors of the Nanobot project are not liable for any direct, indirect, incidental, or consequential damages arising from the use of this guide or the Nanobot software.
Using this software indicates that you understand and accept the above risks.
About BitsLab
BitsLab is an AI security company focused on digital asset security, dedicated to providing integrated solutions of "audit services + AI security engine + security tools" for the emerging Web3 ecosystem, helping project parties and end users build, trade, and use digital assets more securely on-chain.
In the overall security solution, BitsLab forms a complete AI security system with BitsLab AI Scanner + BitsLab Safe: BitsLab Safe, as an AI-based Web3 security product, provides enterprise-level protection, simulating transactions in real-time, identifying scams and malicious contracts, and relying on BitsLab's agentic security stack to protect x402 payments and various AI Agent's on-chain operations; BitsLab AI Scanner, based on vulnerability and threat data engines, performs intelligent audits and risk detection, significantly improving efficiency and reducing false positives.
BitsLab has three sub-brands: MoveBit, ScaleBit, and TonBit, continuing to deepen its efforts in emerging ecosystems such as Sui, Aptos, TON, Solana, Linea, BNB Chain, Soneium, and Starknet, providing professional auditing and vulnerability discovery services to help projects maintain the security and controllability of core infrastructure during rapid iterations. The BitsLab team consists of several top vulnerability research experts who have won international CTF awards multiple times and have discovered and disclosed critical vulnerabilities in well-known projects such as TON, Aptos, Sui, Nervos, OKX, and Cosmos, promoting ecological security upgrades.
You may also like

A decade-long personal feud, if not for OpenAI's "hypocrisy," there would be no globally leading AI company Anthropic

a16z: The True Meaning of Strong Chain Quality, Block Space Should Not Be Monopolized

a16z: The True Meaning of Strong Chain Quality, Block Space Should Not Be Monopolized

2% user contribution, 90% trading volume: The real picture of Polymarket

Trump Can't Take It Anymore, 5 Signals of the US-Iran Ceasefire

Judge Halts Pentagon's Retaliation Against Anthropic | Rewire News Evening Brief

Midfield Battle of Perp DEX: The Decliners, The Self-Savers, and The Latecomers

Iran War Stalemate: What Signal Should the Market Follow?

Rejecting AI Monopoly Power, Vitalik and Beff Jezos Debate: Accelerator or Brake?

Insider Trading Alert! Will Trump Call a Truce by End of April?

After establishing itself as the top tokenized stock, does Ondo have any new highlights?

BIT Brand Upgrade First Appearance, Hosts "Trust in Digital Finance" Industry Event in Singapore

OpenClaw Founder Interview: Why the US Should Learn from China on AI Implementation
WEEX AI Wars II: Enlist as an AI Agent Arsenal and Lead the Battle
Where the thunder of legions falls into a hallowed hush, the true kings of arena are crowned in gold and etched into eternity. Season 1 of WEEX AI Wars has ended, leaving a battlefield of glory. Millions watched as elite AI strategies clashed, with the fiercest algorithmic warriors dominating the frontlines. The echoes of victory still reverberate. Now, the call to arms sounds once more!
WEEX now summons elite AI Agent platforms to join AI Wars II, launching in May 2026. The battlefield is set, and the next generation of AI traders marches forward—only with your cutting-edge arsenal can they seize victory!
Will you rise to equip the warriors and claim your place among the legends? Can your AI Agent technology dominate the battlefield? It's time to prove it:
Arm the frontlines: Showcase your technology to a global audience;Raise your banner: Gain co-branded global exposure via online competition and offline workshops;Recruit and rally troops: Attract new users, build your community and achieve long-term growth;Deploy in real battle: Integrate with WEEX’s trading system for real market use and get real feedback for rapid product iteration;Strategic rewards: Become an agent on WEEX and enjoy industry leading commission rebates and copy trading profit share.Join WEEX AI Wars II now to sound the charge!
Season 1 Triumph: Proven Global DominanceWEEX AI Wars Season 1 was nothing short of a decisive conquest. Across the digital battlefield, over 2 million spectators bore witness to the clash of elite AI strategies. Tens of thousands of live interactions and more than 50,000 event page visits amplified the reach, giving our sponsors a global stage to showcase their power.
Season 1 unleashed a trading storm of monumental scale, where elite algorithmic warriors clashed, shaping a new era in AI-driven markets. $8 billion in total trading volume, 160,000 battle-tested API calls — we saw one of the most hardcore algorithmic trading armies on the planet, forging an ideal arena for strategy iteration and refinement.
On the ground, workshop campaigns in Dubai, London, Paris, Amsterdam, Munich, and Turkey brought AI trading directly to the frontlines. Sponsors gained offline dominance, connecting with top AI trader units and forming strategic alliances. Livestreams broadcast these battles worldwide, amassing 350,000 views and over 30,000 interactions, huge traffic to our sponsors and partners.
For Season 2, WEEX will expand to even more cities, multiplying opportunities for partners to assert influence and command the battlefield, both online and offline.
Season 2 Arsenal: Equip the Frontlines and Command VictoryBy enlisting in WEEX AI Wars II as an AI Agent arsenal, your platform can command unprecedented visibility, and extend your influence across the world. This is your chance to deploy cutting-edge technology, dominate the competitive frontlines, and reap lasting rewards—GAINING MORE USERS, HIGHER REVENUE, AND LONG-TERM SUPREMACY IN THE AI TRADING ARENA.
Reach WEEX’s 8 million userbase and global crypto community. Unleash your potential on a global stage! This is your ultimate opportunity to skyrocket product visibility and rapidly scale your userbase. Following the explosive success of Season 1—which crushed records with 2 million+ total exposures, your brand is next in line for unparalleled reach and industry-wide impact!Test and showcase your AI Agent in real markets. Throw your AI Agents into the ultimate arena! Empower elite traders to harness your tech through the high-speed WEEX API. This isn't just a demo—it's a live-market battleground to stress-test your algorithms, gather mission-critical feedback, and prove your product's dominance in real-time trading.Gain extensive co-branded exposure and traffic support. Command the spotlight! As a partner, your brand will saturate our entire ecosystem, from viral social media blitzes to global live streams and exclusive offline workshops. We don't just show your logo; we ensure your brand is unstoppable and unforgettable to a massive, global audience.Enjoy industry leading rebates. Becoming our partner is not a one-time collaboration, but the start of a long-term, mutually beneficial relationship with tangible revenue opportunities.Comprehensive growth support: WEEX provides partners with exclusive interviews, joint promotions, and livestream exposure to continuously enhance visibility and engagement.By partnering with WEEX, your platform gains high-quality exposure, more users and sustainable flow of revenue. The Hackathon is more than a competition. It is a platform for innovation, collaboration, and tangible business growth.
Grab Your Second Chance: Join WEEX AI Wars II TodayThe second season of the WEEX AI Trading Hackathon will be even more ambitious and impactful, with expanded global participation, livestreamed competitions, and workshops in more cities worldwide. It offers AI Agent Partners a unique platform to showcase their technology, engage with top developers and traders, and gain global visibility.
We invite forward-thinking partners to join WEEX AI Wars II now, to demonstrate innovation, create lasting impact, foster collaboration, and share in the success of the next generation of AI trading strategies.
About WEEXFounded in 2018, WEEX has developed into a global crypto exchange with over 6.2 million users across more than 150 countries. The platform emphasizes security, liquidity, and usability, providing over 1,200 spot trading pairs and offering up to 400x leverage in crypto futures trading. In addition to the traditional spot and derivatives markets, WEEX is expanding rapidly in the AI era — delivering real-time AI news, empowering users with AI trading tools, and exploring innovative trade-to-earn models that make intelligent trading more accessible to everyone. Its 1,000 BTC Protection Fund further strengthens asset safety and transparency, while features such as copy trading and advanced trading tools allow users to follow professional traders and experience a more efficient, intelligent trading journey.
Follow WEEX on social mediaX: @WEEX_Official
Instagram: @WEEX Exchange
Tiktok: @weex_global
Youtube: @WEEX_Official
Discord: WEEX Community
Telegram: WeexGlobal Group

Nasdaq Enters Correction Territory | Rewire News Morning Brief

OpenAI loses to Thousnad-Question, unable to grow a checkout counter in the chatbox

One-Year Valuation Surged 140%, Who Is Signing the Check for Defense AI?

