Open-source endpoint detection for AI agents

Agents execute code.
We execute oversight.

Real-time threat detection for AI coding agents. Local. Open-source. Zero cloud.

568 tests · 107 agents · 70 rules

01Threat Model

Most developers don't realize the risk.

Every time you run an AI coding agent, it inherits your user permissions. It can read your files, execute binaries, and make network requests -- all while you watch it write code. The attack surface is enormous, and until now, there was no way to monitor it.

CRITICAL

Code Execution

Agents run arbitrary shell commands without explicit consent.

rm -rf /curl | bashnpm install
CRITICAL

File Access

Your entire filesystem is readable -- keys, cookies, secrets.

cat ~/.ssh/id_rsa.envkeychain
HIGH

Network Calls

Outbound requests can exfiltrate data to unknown endpoints.

curl -X POSTdns exfilreverse shell
HIGH

Credential Theft

API keys and tokens are one command away from leaking.

cat .envecho $API_KEYgcloud auth

These aren't hypothetical attacks. Prompt injection, supply-chain poisoning, and data exfiltration via coding agents have been demonstrated in the wild.

02Capabilities

Each module operates independently and can be enabled or disabled per agent. Together they form a comprehensive monitoring system that covers every vector an AI agent might exploit.

01

Process Scanner

Tracks every subprocess your agent spawns -- PIDs, arguments, parent-child trees, and execution timelines in real time.

syscall hooksptraceproc/fsreal-time

Aegis hooks into the process tree via syscall interception and ptrace. It monitors /proc/fs for new process creation events, captures full command-line arguments, maps parent-child relationships, and builds execution timelines. If an agent runs rm -rf or curl to an unknown host, you know immediately.

02

File Watcher

Monitors all file I/O and flags access to sensitive paths. Configurable allowlists define what agents can touch.

inotifypath patternsACL checksallowlists

Uses inotify watchers for continuous monitoring of file reads, writes, creates, and deletes. Aegis flags access to sensitive paths -- SSH keys, .env files, browser credential stores, cloud configuration directories. Path pattern matching and ACL checks enforce configurable allowlists per agent.

03

Network Monitor

Captures every outbound connection, DNS query, and HTTP request. Flags anomalous traffic against known-bad databases.

netfilterDNS hooksTLS interceptblocklists

Every outbound TCP connection, DNS query, and HTTP request is captured via netfilter hooks and analyzed. Aegis compares destinations against known-bad endpoint databases and flags anomalous traffic patterns. Optional TLS interception gives you full payload visibility when needed.

04

Risk Scoring Engine

Composite threat score per session using 70+ MITRE ATT&CK rules and lightweight ML anomaly detection.

ML scoring70+ rulesMITRE ATT&CKbehavioral

A composite threat score for each agent session, computed from behavioral signals across all monitoring layers. The scoring engine runs 70+ detection rules mapped to the MITRE ATT&CK framework, and uses lightweight ML models to detect anomalous sequences in process, file, and network activity.

05

Policy Engine

Granular per-agent or global policies for file access, network endpoints, and process types. Auto-blocks on violation.

YAML configper-agent rulesauto-blockalerts

Define granular security policies per agent, per project, or globally via YAML configuration. Specify which files an agent can access, which network endpoints are allowed, and what process types are permitted. Violations trigger alerts or automatic blocks depending on configurable severity thresholds.

06

Audit Log

Structured, queryable event log. Filter by agent, severity, or time range. Export to JSON or pipe to your SIEM.

structured logsSIEM exportJSON outputforensics

Every event Aegis captures is written to a structured, queryable audit log. Filter by agent, time range, severity, or event type. Export to JSON, pipe into your existing SIEM, or review locally. Full forensics capability without sending a single byte to the cloud.

03How It Works

Aegis is designed to be non-intrusive. It runs as a background daemon, consumes minimal resources, and never modifies your agents or their output.

Step 01

Install & configure

Clone the repo, run npm install, and edit the YAML config to define which agents you want to monitor. Aegis auto-detects Claude Code, GitHub Copilot, Cursor, and Aider out of the box. Custom agent definitions take one line.

Step 02

Aegis hooks into the kernel

On startup Aegis registers syscall hooks for process creation, file I/O, and network sockets. It builds a live process tree of every agent on your machine and begins capturing events at the kernel level -- zero userspace overhead.

Step 03

Real-time analysis

Events flow through the policy engine and risk scoring pipeline in under 5ms. Each event is checked against 70+ detection rules, behavioral baselines, and your custom allowlists. High-severity events trigger immediate alerts.

Step 04

Alert, block, or log

Depending on your policy configuration, Aegis can passively log events for later review, send real-time alerts to your terminal or webhook, or actively block dangerous operations before they complete. You decide the response level.

04Comparison

Most AI security tools are cloud-hosted, closed-source, and charge per seat. Aegis is the only open-source, local-first EDR for AI agents.

Open Source

Aegis
Lasso
Prompt Security
PromptArmor

Runs Locally

Aegis
Lasso
Prompt Security
PromptArmor

Free Forever

Aegis
Lasso
Prompt Security
PromptArmor

Process Monitoring

Aegis
Lasso
Prompt Security
PromptArmor

File Watcher

Aegis
Lasso
Prompt Security
PromptArmor

Network Intercept

Aegis
Lasso
Prompt Security
PromptArmor

Risk Scoring

Aegis
Lasso
Prompt Security
PromptArmor

Policy Engine

Aegis
Lasso
Prompt Security
PromptArmor

Audit Logging

Aegis
Lasso
Prompt Security
PromptArmor

No Cloud Required

Aegis
Lasso
Prompt Security
PromptArmor

// BATTLE-TESTED

0+

GitHub Stars

0

Forks

0

Tests Passing

0

Agents Monitored

05Quick Start

Aegis installs in under 30 seconds. No configuration files to write, no accounts to create, no cloud services to provision. Just clone, install, and start.

01Clone the repository
$ git clone https://github.com/antropos17/Aegis.git && cd Aegis
02Install dependencies
$ npm install
03Start Aegis
$ npm start
View on GitHub

MIT License · No account required · No cloud dependency

06Live Demo

A live web demo of the Aegis Electron UI. No install required.

Launch Demo →

Opens in new tab · No account needed

Scanning your machine… 3 agents detected.
[14:23:01]cursor-agent attempted ~/.ssh/id_rsaBLOCKED