Product
What happens when an agent calls a tool.
From interception to audit trail. Every step, every verdict, every rule.
Product
From interception to audit trail. Every step, every verdict, every rule.
AI agents don't just use MCP. They execute shell commands, read files, search code, call APIs. Oktsec monitors both channels simultaneously.
Once intercepted, every call hits the detection engine.
Every rule is a deterministic YAML pattern or a specialized analyzer. No probabilistic classification, no model drift, no prompt sensitivity. The pipeline runs in microseconds.
The pipeline returns one of four verdicts.
Every tool call gets exactly one verdict. The verdict determines what happens next.
No rules triggered. The call proceeds to the backend.
Low-severity match. The call proceeds but appears in the dashboard with a warning.
High-severity match. The call is held until a human approves or rejects it. HTTP 202.
Critical threat detected. The call never reaches the backend. The agent receives an error.
Every verdict is logged. Permanently.
Every tool call produces an immutable audit entry with SHA-256 hash chain and Ed25519 proxy signatures. Export to CSV, JSON, or SARIF.
Reconstruct the full timeline of any session at /dashboard/sessions/{id}. Vertical timeline with every tool call, verdict, gap duration, and decision. Export per session to CSV, JSON, or SARIF 2.1.0.
Model chain-of-thought linked to each tool call via reasoning_log table. SHA-256 hashed. Query by session or event. See exactly what the agent was thinking when it acted.
SHA-256 hash chain means any tampering breaks the chain. Ed25519 signatures prove provenance. Delegation chain hash persisted in every entry.
EU AI Act enforcement begins August 2026. NIST AI RMF requires audit trails for AI systems. Session traces with reasoning capture provide the forensic depth both frameworks demand. SARIF export integrates with existing GRC tooling.
When the rule engine flags something suspicious, the optional LLM layer goes deeper.
The 217-rule core evaluates each event in isolation. An async LLM layer correlates events over time, escalating agent risk when cumulative behavior crosses a threshold.
When cumulative risk exceeds the threshold, future verdicts escalate: clean → flag → quarantine → block. Per-agent, reversible automatically via TTL.
An agent does an innocent Read, a normal WebSearch, then a Bash combining both. No single rule catches it. The LLM sees the sequence and escalates.
The LLM can also auto-generate new detection rules from suspicious patterns. Generated rules go to a review queue. Nothing deploys without human approval.
Rules decide what happens. Access control decides who can try.
Every agent gets an Ed25519 keypair. Delegation chains trace authorization from human to any sub-agent. Ephemeral keys limit blast radius per task. No shared secrets, no bearer tokens, no trust-by-default.
Ed25519-signed tokens create a verifiable path from human to sub-agent. Each hop narrows scope. ChainDepth tracks authorization lineage. oktsec delegate CLI and X-Oktsec-Delegation header.
Task-scoped Ed25519 keypairs that auto-expire. In-memory only, never persisted to disk. MaxPerTask and MaxTTL caps. 30s eviction loop. Compromised key = limited blast radius.
Per-agent cryptographic identity. Every request is signed and verified.
Define which tools each agent can access. Deny by default, allow explicitly.
Restrict agents to specific MCP tools. Block filesystem, network, or shell access per agent.
Per-agent and global budget caps for LLM threat intel. Prevents runaway API costs.
Per-agent request throttling. Prevents denial of service from compromised agents.
High-severity actions require human approval. Configurable per verdict level.
How do you know your deployment is secure?
The oktsec audit command evaluates your agent infrastructure against 41 deployment checks and returns a letter grade with actionable findings.
Not every tool call needs every rule. Scan profiles eliminate false positives by matching rule sensitivity to tool type. Monitor everything from the terminal or the browser.
All 217 rules applied. For high-risk tools like Bash and shell execution. Maximum coverage, zero compromise.
Only critical rules for content tools (Read, Write, Edit). An Edit writing HTML won't trigger shell injection rules. Default for auto-registered agents.
Bare minimum rule set. For trusted internal tools where noise reduction matters more than coverage.
Per-rule apply_to_tools and exempt_tools fields. TC-005 (shell injection) scoped to Bash by default. Full control per rule per tool.
A Bubbletea-powered TUI gives you real-time monitoring where you already work. Live event feed, agent filtering, threat counters. No browser required.
Real-time event stream from the audit hub. Scroll, pause, resume, expand event details. Alt-screen mode keeps your terminal clean.
Filter the live feed by agent. Focus on one agent's activity without the noise from the rest of the fleet.
Always-visible counters: events scanned, threats detected, events blocked, active agents. GitHub Dark color palette.
Performance benchmarks and deployment options for teams running agents at scale.
Messages processed per second through the full 10-stage pipeline
Audit log batch write throughput to SQLite
Ed25519 signature generation per audit entry
Ed25519 signature verification per entry
Dashboard queries at 1M+ rows in the audit database
Zero CGO, zero runtime dependencies, cross-platform Go binary
Oktsec adapts to your infrastructure. Run it as a turnkey solution, a gateway, a proxy, or integrate it into your existing MCP setup.
| Mode | Command | Description |
|---|---|---|
| Turnkey | oktsec run | Auto-discovers MCP servers, generates config, starts gateway + dashboard + hooks. Zero to full visibility in 30 seconds. |
| Gateway | oktsec gateway | Standalone MCP security proxy. Sits in front of any MCP server and intercepts all tool calls. |
| Proxy | oktsec serve | HTTP reverse proxy mode. Forward traffic through Oktsec for inspection and logging. |
| Stdio | oktsec proxy | Stdio transport proxy for MCP servers that use stdin/stdout communication. |
| MCP Server | oktsec mcp | Run Oktsec itself as an MCP server. Query the audit trail, check security posture, manage rules from any MCP client. |
| Audit | oktsec audit | Offline security posture assessment. 41 checks, letter grade, auto-remediation suggestions. |