Clawdbot, Moltbot, OpenClaw, Oh My! Jim Manico on the Wild Ride of the Agentic Internet
No se pudo agregar al carrito
Add to Cart failed.
Error al Agregar a Lista de Deseos.
Error al eliminar de la lista de deseos.
Error al añadir a tu biblioteca
Error al seguir el podcast
Error al dejar de seguir el podcast
-
Narrado por:
-
De:
In this episode of CyberOXtales, host Neatsun Ziv, CEO of OX Security, sits down with Jim Manico, Founder of Manicode Security and legendary AppSec educator, to explore the rapid transition from manual coding to AI-driven orchestration. As the industry moves toward "vibe coding" and autonomous agents, they discuss the radical shift in how software is built, secured, and potentially compromised.
From a family legacy of teaching to the front lines of "OpenClaw," this conversation serves as a roadmap for leaders navigating the tension between hyper-productivity and the emerging risks of autonomous AI identities.
About Our Guest
Jim Manico is a third-generation educator and a foundational figure in the application security world. After realizing in the late 1990s that security was often an afterthought in web development, he dedicated his career to recording and teaching secure coding practices. Today, he is a professional educator and "PowerPoint jockey" who helps global organizations secure their development lifecycles while aggressively experimenting with the cutting edge of AI automation.
Connect with Jim Manico: LinkedIn
Key Takeaways
- The Orchestration Shift – Software development is evolving from manual coding to "vibe coding," where developers build engineering harnesses and machine-readable requirements for AI to execute.
- The Power of Autonomous Agents – Tools like Clawbot and Moltbot allow AI to automate entire projects and research tasks, including the ability for agents to establish private communication channels with one another.
- "Designed for Compromise" Security – Testing autonomous agents requires a zero-trust approach: utilize isolated hardware, limited-access OAuth tokens, and operate under the assumption that the agent identity will be fully compromised.
- Enterprise Readiness – CISOs should restrict broad company-wide use today while tasking security architects to develop the best practices needed to safely roll out agent fleets in the future.
Listen to this episode to learn how to bridge the gap between bleeding-edge AI productivity and the rigorous security architectures required to survive the "Wild West" of autonomous software engineering.