Back to Blog
AI Agent Security6 min read

NemoClaw Secures the Runtime. VettIQ Secures the Supply Chain.

NVIDIA's NemoClaw launched at GTC with enterprise-grade sandboxing for AI agents. It solves one half of the security problem. Here's what solves the other half.

The Two Halves of Agent Security

When you deploy an AI agent, you face two distinct security problems:

  1. Runtime security — what happens when the agent runs. Can it escape its sandbox? Can it access files it shouldn't? Can it make network calls to unauthorized endpoints?
  2. Supply chain security — what goes into the agent environment. Are the MCP servers and skills the agent uses actually safe? Has anyone checked them for prompt injection, credential theft, or malware?

NemoClaw answers question #1 with OpenShell sandboxed execution. VettIQ answers question #2 with the MCP Trust Directory. Together, they provide defense in depth.

What NemoClaw Brings to the Table

NemoClaw (announced at NVIDIA GTC, March 16, 2026) is an enterprise-grade runtime security layer for AI agents. It provides:

  • OpenShell containers that isolate agent actions from the host system
  • Policy-based access control defining what the agent can and cannot do
  • Privacy routing that keeps sensitive data on local Nemotron models instead of cloud APIs
  • Action logging for compliance audit trails

This is exactly what the AI agent ecosystem needed. Before NemoClaw, most agents ran with zero runtime guardrails — full network access, no approval gates, no sandboxing.

The Gap: A Malicious Skill in a Sandbox Is Still Malicious

NemoClaw sandboxes execution. But it trusts whatever you install inside the sandbox.

Consider the MCP ecosystem. There are now over 2,000 MCP servers on GitHub. Developers install them into Claude Code, Cursor, Windsurf, and NemoClaw environments with a single command. Most have never been security-reviewed.

A sandboxed agent running a malicious MCP server can still:

  • Exfiltrate data through approved network endpoints
  • Inject malicious prompts that manipulate the agent's behavior
  • Abuse API keys that the agent legitimately has access to
  • Read sensitive files within the sandbox's mounted volumes

The sandbox contains the blast radius. But the damage still happens inside the container.

How VettIQ Fills the Gap

VettIQ operates upstream of NemoClaw. Before a skill enters the sandbox, VettIQ has already scanned it through four security engines:

Snyk — prompt injection and code vulnerability detection
Cisco Kenna — dependency risk scoring across the full tree
Semgrep — dangerous code patterns (eval, exec, credential access)
VirusTotal — malware signature matching against 70+ engines

The results are published to the MCP Trust Directory — a free, public database of 1,000+ MCP servers, each with a risk score from 0 to 100. Green (0-30) means safe. Amber (31-65) means use with guardrails. Red (66+) means don't install.

The Workflow

1. Developer finds an MCP server on GitHub

2. Checks vettiq.ai/mcp for trust score

3. Sees: APPROVED (risk score 12/100)

4. Installs into NemoClaw with confidence

5. NemoClaw enforces runtime guardrails

Result: defense in depth

Not a Partnership — a Complement

VettIQ is not a NemoClaw product or partner. We're an independent security layer that works alongside any agent platform — NemoClaw, OpenClaw, Claude Code, Cursor, Windsurf, or custom agents.

NemoClaw happens to be the strongest runtime complement because it takes sandboxing seriously. VettIQ takes supply chain vetting seriously. Together, they cover the full attack surface.

Get Started Today

VettIQ's MCP Trust Directory is live and free: