Clawdbot, Moltbot, OpenClaw, Oh My! Jim Manico on the Wild Ride of the Agentic Internet Podcast Por  arte de portada

Clawdbot, Moltbot, OpenClaw, Oh My! Jim Manico on the Wild Ride of the Agentic Internet

Clawdbot, Moltbot, OpenClaw, Oh My! Jim Manico on the Wild Ride of the Agentic Internet

Escúchala gratis

Ver detalles del espectáculo

In this episode of CyberOXtales, host Neatsun Ziv, CEO of OX Security, sits down with Jim Manico, Founder of Manicode Security and legendary AppSec educator, to explore the rapid transition from manual coding to AI-driven orchestration. As the industry moves toward "vibe coding" and autonomous agents, they discuss the radical shift in how software is built, secured, and potentially compromised.

From a family legacy of teaching to the front lines of "OpenClaw," this conversation serves as a roadmap for leaders navigating the tension between hyper-productivity and the emerging risks of autonomous AI identities.

About Our Guest

Jim Manico is a third-generation educator and a foundational figure in the application security world. After realizing in the late 1990s that security was often an afterthought in web development, he dedicated his career to recording and teaching secure coding practices. Today, he is a professional educator and "PowerPoint jockey" who helps global organizations secure their development lifecycles while aggressively experimenting with the cutting edge of AI automation.

Connect with Jim Manico: LinkedIn

Key Takeaways

  • The Orchestration Shift – Software development is evolving from manual coding to "vibe coding," where developers build engineering harnesses and machine-readable requirements for AI to execute.
  • The Power of Autonomous Agents – Tools like Clawbot and Moltbot allow AI to automate entire projects and research tasks, including the ability for agents to establish private communication channels with one another.
  • "Designed for Compromise" Security – Testing autonomous agents requires a zero-trust approach: utilize isolated hardware, limited-access OAuth tokens, and operate under the assumption that the agent identity will be fully compromised.
  • Enterprise Readiness – CISOs should restrict broad company-wide use today while tasking security architects to develop the best practices needed to safely roll out agent fleets in the future.

Listen to this episode to learn how to bridge the gap between bleeding-edge AI productivity and the rigorous security architectures required to survive the "Wild West" of autonomous software engineering.




Todavía no hay opiniones