تخطَّ إلى المحتوى

Operant AI

AI agent runtime security platform providing runtime protection for autonomous AI agents, MCP workflows, and coding assistants across enterprise environments.

ComponentDescription
Agent ProtectorRuntime observability and threat detection for AI agent loops and LLM interactions
Endpoint ProtectorEnterprise AI registry, shadow AI discovery, and reputation scoring for desktop endpoints
CodeInjectionGuardRuntime scanning of packages, shell commands, and file operations initiated by coding agents
Policy EngineCentralized policy definition and enforcement across all protection layers
Telemetry PipelineReal-time event streaming, logging, and alerting for security teams
Threat CategoryOWASP LLM ReferenceProtection Layer
Prompt injectionLLM01Agent Protector
Sensitive information disclosureLLM02Data exfiltration defense, auto-redaction
Supply chain vulnerabilitiesLLM03CodeInjectionGuard package scanning
Excessive agencyLLM08Agent loop tracing, policy enforcement
Unauthorized code executionLLM06CodeInjectionGuard shell monitoring
Data exfiltration via tool useLLM07PII/PCI/PHI policy enforcement
Shadow AI usageN/AEndpoint Protector discovery
MCP server compromiseN/AMCP registry and reputation scoring
# MDM/JAMF managed deployment for macOS endpoints
# Distributed via MDM profile with configuration payload
# Supports macOS 13+ (Ventura and later)

# Verify agent status after MDM deployment
operant-agent status

# Check endpoint protection is active
operant-agent health-check
# Group Policy or Intune managed deployment
# MSI installer for enterprise distribution
# Supports Windows 10/11 with WSL2 environments

# Verify agent status (PowerShell)
operant-agent.exe status

# Check protection status
operant-agent.exe health-check
# Package-based installation for Linux workstations and servers
# Supports Ubuntu 22.04+, RHEL 9+, Debian 12+

# Verify agent status
operant-agent status

# View current configuration
operant-agent config show
FeatureDescription
Pre-install scanningAnalyzes packages before installation by coding agents
Known vulnerability matchingCross-references against CVE databases in real time
Typosquatting detectionIdentifies packages with names similar to popular libraries
Dependency chain analysisEvaluates transitive dependencies for hidden risks
Reputation scoringAssigns risk scores based on package age, maintainer history, and download patterns
Policy-based blockingBlocks packages that violate configured security policies
FeatureDescription
Command interceptionMonitors shell commands initiated by AI coding agents
Dangerous pattern detectionFlags commands involving rm -rf, curl | bash, chmod 777, etc.
Network call trackingLogs outbound connections initiated by agent-spawned processes
Process tree tracingMaps parent-child relationships for agent-initiated processes
Sandboxed executionOptionally runs agent commands in isolated environments
Allowlist/blocklist rulesConfigurable rules for permitted and denied command patterns
FeatureDescription
Sensitive file access monitoringDetects reads of .env, credentials, SSH keys, and config files
Path-based policy enforcementRestricts file access to defined project directories
Content inspectionScans file contents for secrets before allowing agent access
Audit loggingRecords all file access events with timestamps and context
FeatureDescription
Full loop visibilityTraces each iteration of an AI agent’s reasoning and action loop
Tool call monitoringRecords every tool invocation with inputs and outputs
Token usage trackingMonitors token consumption per agent session
Latency profilingMeasures time spent in each phase of the agent loop
Loop depth limitsConfigurable maximum iterations to prevent runaway agents
Decision point loggingCaptures branching decisions and reasoning chains
Detection CategoryDescription
Prompt injection attemptsIdentifies injected instructions in user inputs and retrieved content
Goal hijackingDetects when agent behavior deviates from stated objectives
Privilege escalationFlags attempts to access resources beyond granted permissions
Data exfiltration patternsRecognizes unauthorized data transfer via tool calls
Excessive tool usageAlerts on abnormal frequency or volume of tool invocations
Hallucination-driven actionsIdentifies actions based on fabricated information
Recursive self-modificationDetects agents attempting to modify their own instructions
OWASP CategoryOperant Detection
LLM01 Prompt InjectionInput/output scanning, instruction boundary enforcement
LLM02 Insecure Output HandlingOutput validation before downstream consumption
LLM03 Training Data PoisoningRuntime behavior anomaly detection
LLM04 Model Denial of ServiceRate limiting, resource consumption monitoring
LLM05 Supply Chain VulnerabilitiesPackage and dependency scanning
LLM06 Sensitive Info DisclosurePII/secret detection in agent outputs
LLM07 Insecure Plugin DesignMCP server vetting and runtime monitoring
LLM08 Excessive AgencyLoop tracing, action scope enforcement
LLM09 OverrelianceConfidence scoring and human-in-the-loop triggers
LLM10 Model TheftAccess control and session integrity checks
FeatureDescription
MCP server catalogCentralized registry of approved MCP servers and tools
Version managementTracks and enforces approved versions of MCP servers
Configuration baselinesDefines standard configurations for registered tools
Access controlRole-based permissions for MCP server usage
Audit trailLogs all MCP server interactions across the organization
FeatureDescription
Endpoint scanningDiscovers unauthorized AI tools running on managed endpoints
Network traffic analysisIdentifies connections to known AI service APIs
Process monitoringDetects AI-related processes and browser extensions
Usage reportingGenerates reports on shadow AI adoption across the organization
Risk classificationCategorizes discovered tools by security risk level
FeatureDescription
Multi-factor scoringEvaluates tools based on security posture, data handling, and compliance
Community signalsIncorporates community trust indicators and vulnerability history
Continuous reassessmentScores update dynamically as new intelligence becomes available
Threshold-based enforcementBlocks tools that fall below configured reputation thresholds
Policy TypeScope
PII detectionNames, emails, phone numbers, addresses, SSNs in agent I/O
PCI complianceCredit card numbers, CVVs, expiration dates in data flows
PHI protectionMedical records, health identifiers, insurance IDs
Custom patternsOrganization-defined sensitive data patterns via regex
Contextual classificationUnderstands data sensitivity based on surrounding context
FeatureDescription
Inline redactionReplaces sensitive data with tokens before agent processing
Reversible tokenizationAuthorized users can recover original values when needed
Format-preserving maskingMaintains data structure while obscuring sensitive values
Selective redactionPolicies determine which fields to redact per use case
Audit loggingRecords all redaction events for compliance reporting
# Example policy configuration structure
policy:
  name: "production-agent-security"
  version: "1.0"
  scope:
    environments: ["production", "staging"]
    agent_types: ["coding-assistant", "data-analyst"]

  code_injection_guard:
    package_scanning:
      enabled: true
      block_on_cve: true
      min_reputation_score: 70
      blocked_packages: ["malicious-pkg-example"]
    shell_monitoring:
      enabled: true
      blocked_patterns:
        - "curl.*|.*bash"
        - "rm -rf /"
        - "chmod 777"
      allow_network_calls: false

  data_protection:
    pii_detection: true
    pci_detection: true
    phi_detection: true
    auto_redaction: true
    custom_patterns:
      - name: "internal-project-id"
        regex: "PROJ-[A-Z0-9]{8}"
        action: "redact"

  agent_limits:
    max_loop_iterations: 50
    max_tool_calls_per_session: 200
    max_tokens_per_session: 100000
    require_human_approval:
      - "file_delete"
      - "network_request"
      - "database_write"
OperationDescription
Policy creationDefine security policies via YAML configuration or management console
Policy assignmentAssign policies to teams, projects, or individual endpoints
Policy versioningTrack policy changes with version history and rollback capability
Policy inheritanceChild policies inherit and can override parent policy settings
Policy simulationTest policy impact in dry-run mode before enforcement
Conflict resolutionAutomatic resolution when multiple policies apply to the same scope
IntegrationDescription
SSO providersSAML 2.0 and OIDC integration for enterprise identity providers
RBAC enforcementRole-based access control for agent capabilities and data access
ABAC supportAttribute-based policies for fine-grained access decisions
Service identityMachine identity verification for agent-to-service communication
Session managementSecure session handling with configurable timeout and renewal
MFA enforcementMulti-factor authentication for sensitive agent operations
FeatureDescription
User-scoped policiesDifferent security policies based on user role and clearance
Team-based controlsApply policies at the team or department level
Temporal accessTime-bound permissions for agent capabilities
Contextual authorizationAccess decisions based on location, device, and risk score
Event CategoryExamples
Security eventsInjection attempts, policy violations, blocked actions
Agent activityLoop iterations, tool calls, token consumption
Endpoint eventsShadow AI discovery, reputation changes, agent installations
Data eventsPII detections, redaction actions, exfiltration attempts
System eventsAgent health, configuration changes, policy updates
TargetDescription
SIEM platformsStream events to Splunk, Sentinel, Chronicle, and other SIEMs
SOAR workflowsTrigger automated response playbooks on critical detections
Webhook endpointsReal-time notifications to custom endpoints
DashboardBuilt-in visualization for security posture and agent activity
API accessREST API for programmatic access to telemetry data
# Example alerting configuration
alerts:
  - name: "critical-injection-detected"
    condition: "event.type == 'prompt_injection' AND event.severity >= 'high'"
    channels: ["slack", "pagerduty"]
    throttle: "5m"

  - name: "data-exfiltration-attempt"
    condition: "event.type == 'data_exfiltration' AND event.blocked == true"
    channels: ["siem", "email"]
    throttle: "1m"

  - name: "shadow-ai-discovered"
    condition: "event.type == 'shadow_ai_discovery'"
    channels: ["slack"]
    throttle: "1h"
IntegrationDescription
MCP server monitoringRuntime visibility into MCP server tool calls and data flows
Coding agent supportProtection for Claude Code, Cursor, Windsurf, and similar agents
IDE extensionsIntegration with VS Code, JetBrains, and other development environments
CI/CD pipelinesSecurity scanning within automated build and deployment workflows
API gatewaysInspection of AI agent traffic at the API gateway layer
ControlDescription
Tool allowlistingRestrict which MCP tools agents can invoke
Input validationValidate tool inputs against defined schemas before execution
Output inspectionScan tool outputs for sensitive data before returning to agents
Rate limitingEnforce per-tool and per-session rate limits
Approval workflowsRequire human approval for high-risk tool invocations
Audit loggingComplete record of all MCP interactions for compliance
PracticeDescription
Start with monitoring modeDeploy in observe-only mode before enabling enforcement
Layer defense policiesCombine CodeInjectionGuard, Agent Protector, and data policies
Integrate with existing SIEMRoute all security events to your central logging platform
Review shadow AI reports weeklyStay ahead of unauthorized AI tool adoption
Update reputation databasesKeep MCP and package reputation data current
Test policies in simulationUse dry-run mode to validate policy changes before production
Define escalation pathsMap detection severity levels to response procedures
Maintain tool allowlistsRegularly review and update approved MCP servers and tools