See everything your
AI agents execute.
Real-time monitoring for every tool call. One command to start.
Open source. Self-hosted. No cloud required.
What you see in 30 seconds.
Every tool call logged. Every agent mapped. Every threat detected. The dashboard is the product.
Every tool call, logged
Every Read, Write, Bash, API call, and MCP tool execution - captured before and after. Filter by agent, tool, verdict, or time range. 4 verdicts: clean, flag, quarantine, block.
Agent topology, mapped
See which agents communicate, what tools they use, and where the traffic flows. Identify hubs, producers, and consumers. Real-time threat scoring per agent.
Threats detected, resolved
268 detection rules across 19 categories: prompt injection, data exfiltration, credential leaks, memory poisoning, container escape, supply chain, MCP attacks, and more. Powered by Aguara v0.14.4 with Aho-Corasick prefilter for single-pass matching. Context-aware scanning penalizes findings in documentation blocks. Zero LLM in the core.
Session inventory and AI analysis
Full session inventory with search and threat filtering. Click any session for AI-powered analysis: risk level, what happened, what to do, and human vs. agent interaction flow. Analysis persisted as audit evidence.
Per-tool egress policies
Restrict which endpoints each tool can reach. WebFetch gets Slack and GitHub, Bash gets zero egress. 16 built-in integration presets: Slack, GitHub, Telegram, Discord, Jira, Linear, Notion, Stripe, OpenAI, Anthropic, and more. Configure from the dashboard.
11 dashboard pages. Real-time via SSE. Overview, Events, Agents, Rules, Audit, Sessions, Graph, Gateway, Discovery, Alerts, Settings.
brew install oktsec/tap/oktsec
# or
go install github.com/oktsec/oktsec/cmd/oktsec@latestoktsec run
# Dashboard opens at
http://localhost:8080/dashboardopenclaw plugins install @oktsec/openclawRuns inside OpenClaw nativelyEvery tool call. Intercepted before execution.
AI agents don't just use MCP. They execute shell commands, read files, and browse the web. Oktsec monitors both channels simultaneously. Every tool call is intercepted before execution and after.
MCP Gateway
CLI Hooks
HTTP endpoint (POST /hooks/event) intercepts tool calls before execution. Captures agent identity, delegation chains, and model reasoning.
Nobody else monitors both channels.
Every action logged. Nothing deleted.
SHA-256 hash chain. Ed25519 signatures. Full forensic capability. Export to CSV, JSON, or SARIF. EU AI Act high-risk AI system requirements take effect August 2, 2026.
Every tool call produces an immutable audit entry. Delegation chains trace authorization from human to sub-agent. Ephemeral keys expire automatically per task. Session traces reconstruct the full timeline with reasoning capture. When your auditor asks "what did this agent do on Tuesday at 3pm?" you have the answer and the full chain of who authorized it.
SHA-256 hash chain with Ed25519 signatures on every audit entry. Tampering breaks the chain. Verify integrity from the dashboard or CLI.
Tamper-evident audit trailinternal/audit/chain.go · verifiable on GitHub
Delegation chains trace authorization from human approval to sub-agent execution. When your auditor asks who authorized a tool call, you have the cryptographic proof.
Cryptographic delegationinternal/identity/ · Ed25519 signed tokens
SARIF 2.1.0 export feeds findings into GitHub Advanced Security, Semgrep, and Snyk. Drop into the security workflows your team already runs.
Works with your stackinternal/auditcheck/sarif.go
Open source core.
Enterprise when you scale.
Everything you need to monitor your agents is free. Pay when you need fleet management, RBAC, and compliance packages.
Everything you need to monitor your agents.
Fleet-wide visibility with roles and escalation.
Regulated industries and large-scale deployments.
Cross-platform. Open source today, enterprise-ready tomorrow.
Ship AI agents with confidence.
Open source and ready to install. One command. 30 seconds to first scan.
Open source. Self-hosted. One command to start.