See everything your
AI agents execute.
Real-time monitoring for every tool call. One command to start.
Open source. Self-hosted. No cloud required.
What you see in 30 seconds.
Every tool call logged. Every agent mapped. Every threat detected. The dashboard is the product.
Every tool call, logged
Every Read, Write, Bash, API call, and MCP tool execution - captured before and after. Filter by agent, tool, verdict, or time range. 4 verdicts: clean, flag, quarantine, block.
Agent topology, mapped
See which agents communicate, what tools they use, and where the traffic flows. Identify hubs, producers, and consumers. Real-time threat scoring per agent.
Threats detected, resolved
217 detection rules catch prompt injection, data exfiltration, credential leaks, and 13 more categories. Aguara v0.9.1 with context-aware scanning drops false positives from ~40% to <1%. Aho-Corasick one-pass matching. Zero LLM in the core.
Session inventory and AI analysis
Full session inventory with search and threat filtering. Click any session for AI-powered analysis: risk level, what happened, what to do, and human vs. agent interaction flow. Analysis persisted as audit evidence.
Per-tool egress policies
Restrict which endpoints each tool can reach. WebFetch gets Slack and GitHub, Bash gets zero egress. 16 built-in integration presets: Slack, GitHub, Telegram, Discord, Jira, Linear, Notion, Stripe, OpenAI, Anthropic, and more. Configure from the dashboard.
12 dashboard pages. Real-time via SSE. Events, Agents, Rules, Threat Intel, Graph, Audit, Sessions, Settings, Gateway, Discovery, Alerts, and more.
brew install oktsec/tap/oktsec
# or
go install github.com/oktsec/oktsec/cmd/oktsec@latestoktsec run
# Dashboard opens at
http://localhost:8080/dashboardopenclaw plugins install @oktsec/openclawRuns inside OpenClaw nativelyEvery tool call. Intercepted before execution.
AI agents don't just use MCP. They execute shell commands, read files, and browse the web. Oktsec monitors both channels simultaneously. Every tool call is intercepted before execution and after.
MCP Gateway
CLI Hooks
HTTP endpoint (POST /hooks/event) intercepts tool calls before execution. Captures agent identity, delegation chains, and model reasoning.
Nobody else monitors both channels.
Every action logged. Nothing deleted.
SHA-256 hash chain. Ed25519 signatures. Full forensic capability. Export to CSV, JSON, or SARIF. EU AI Act enforcement begins August 2026.
Every tool call produces an immutable audit entry. Delegation chains trace authorization from human to sub-agent. Ephemeral keys expire automatically per task. Session traces reconstruct the full timeline with reasoning capture. When your auditor asks "what did this agent do on Tuesday at 3pm?" you have the answer and the full chain of who authorized it.
"Finally someone monitoring MCP tool calls at runtime. We were writing custom wrappers for this. oktsec replaces all of that."
Security EngineerAI infrastructure team, Series B startup
"The dual-channel approach is what got my attention. Nobody else watches CLI hooks and MCP gateway together."
Staff EngineerPlatform security, fintech
"Installed it in under a minute. Had the dashboard running before my coffee was ready. The audit trail alone justifies it."
DevOps LeadEarly adopter, open source contributor
Open source core.
Enterprise when you scale.
Everything you need to monitor your agents is free. Pay when you need fleet management, RBAC, and compliance packages.
Everything you need to monitor your agents.
Fleet-wide visibility with roles and escalation.
Regulated industries and large-scale deployments.
Cross-platform. Open source today, enterprise-ready tomorrow.
Ship AI agents with confidence.
Open source and ready to install. One command. 30 seconds to first scan.
Open source. Self-hosted. One command to start.