Zero verification between agents. Zero authorization on tool calls. Oktsec changes that. Every message and every tool call is signed, inspected, and logged.
Be the first to know about new releases, rules, and integrations.
Born from Aguara — an open-source security scanner with 153+ rules across 13 categories, including NLP analysis and taint tracking. Crawls 7 registries every 6 hours.
When Agent A sends a message to Agent B, there is no identity verification, no content inspection, and no policy enforcement. Nobody is watching.
OWASP Top 10 for Agentic Applications (2026) now classifies these as critical risks.
Agent A embeds instructions in a message to Agent B, which executes them as its own. Second-order prompt injection across agent boundaries, already exploited in production.
Sensitive data flows through agent chains without content inspection. PII, credentials, and business data leak across trust boundaries with zero forensic trail.
No cryptographic identity means any agent can claim to be any other. A compromised agent escalates privileges, poisons shared memory, and coordinates attacks undetected.
40% of enterprise apps will run AI agents by end of 2026 (Gartner). 3 million active agents deployed in US/UK, only 14.4% with full security approval (Gravitee). OpenClaw reached 145K GitHub stars in weeks with 42,000 exposed instances and 93% critical auth bypass (Bitsight).
In 2026, OWASP published its first Top 10 for Agentic Applications. Inter-agent communication is now classified as a critical risk (ASI07). NIST NCCoE published a concept paper asking how to authenticate, authorize, and audit AI agents. Oktsec already implements answers to all 6 questions →
"Everyone is shipping agents. Nobody is shipping the security layer between them."
ServiceNow Now Assist (Nov 2025): second-order prompt injection through an agent relay led to full PII exfiltration in production. OpenClaw (2026): 42K+ exposed instances, 93% without authentication, 512 critical vulnerabilities. CrowdStrike describes it as "a powerful AI backdoor agent."
A lightweight security layer that sits between your agents and between your agents and their tools. Every message and every tool call is verified, inspected, and logged. 169+ detection rules across 15 categories. The MCP Gateway extends the same pipeline to any MCP server. No LLM in the loop. Thousands of operations per second. Open source.
Ed25519 keypairs per agent. Every message is cryptographically signed. No message is accepted without verified sender identity.
YAML rules that define what each agent can send, receive, and access. Built on the same detection engine as Aguara, adapted for runtime.
Every inter-agent message is logged with content hash, sender identity, policy decision, and timestamp. Full forensic capability.
Oktsec now sits in front of any MCP server as a Streamable HTTP proxy. Per-agent identity, tool-level access control, content scanning, rate limiting, and full audit trail. Agents that handle payments, databases, or file systems get enterprise-grade security with one YAML file.
Read the deep dive →Every rule is pattern-based and deterministic. NLP analysis detects semantic attacks. Taint tracking follows data flows that regex alone would miss. Covers 7 of 10 OWASP Agentic categories.
Full rule reference on GitHub · 7/10 OWASP Agentic
oktsec audit auto-detects installed agent frameworks and audits their configurations. Scores each product A–F. Outputs SARIF for GitHub Code Scanning and CI pipelines.
Auto-detects OpenClaw, NanoClaw, and Oktsec configs. A-F grading. SARIF output for GitHub Code Scanning and CI pipelines.
Real numbers from real benchmarks on a single node. The core works today. Capital accelerates the path to enterprise scale.
| Metric | Open Source (today) | Enterprise (next) |
|---|---|---|
| Throughput | 5,500 msg/sec · 90,000 batched | Distributed writers, horizontal scaling |
| Signature | ~50µs sign · ~120µs verify | Go stdlib, no bottleneck |
| Queries | <6ms at 1M+ rows | ClickHouse for multi-billion rows |
| Deployment | Single binary · Docker | K8s · Managed cloud · Multi-region |
28,000+ lines of Go. 380+ tests. Open source covers startups and design partners from day one. Enterprise scaling is an engineering problem with a known path.
Oktsec doesn't care what orchestrator you use. LangGraph, CrewAI, AutoGen, or your own custom stack. Route agent traffic through Oktsec and every message gets identity-verified, policy-checked, and logged.
Single binary or container. Sits between agents. Any framework, any language. No SDK required.
Import as a library for Ed25519 signing, content inspection, and injection detection. No separate process.
Expose Oktsec as an MCP tool. Works with Claude, Cursor, Windsurf, and any MCP-compatible client.
Agent security is an emerging category. Each approach solves a piece of the problem.
| Approach | Strength | Gap |
|---|---|---|
| Oktsec Rule-based security layer | Identity + policy + content inspection + audit at the message level. No AI guessing, local-first, open source. 7/10 OWASP Agentic | Early stage. Not yet enterprise-hardened, no cloud-hosted option yet. |
| AI firewalls Cisco AI Defense, Lakera | Network-level prompt filtering, enterprise scale | No agent identity, no inter-agent policy, LLM-based |
| Agent identity Multifactor, AIM | Cryptographic agent identity, auth protocols | No content inspection, no runtime policy at the message level |
| Static scanners mcp-scan, Invariant | Pre-deploy vulnerability detection, open source | No runtime protection. Scans before deploy, not during execution. |
Aguara scans skills before deployment. Aguara Watch crawls 7 registries tracking 40K+ skills. Oktsec extends the engine with runtime enforcement, cryptographic identity, and deployment audits. Each tool feeds data back into the detection engine.
Same detection engine. Data flows both ways.
Every previous computing paradigm created a dedicated security category: firewalls for networks, IAM for cloud, EDR for endpoints. AI agents are the next platform shift, and the inter-agent communication layer is entirely unprotected.
AI security market growing at 23.3% CAGR. Agent security is the fastest-growing subsegment as enterprise adoption accelerates.
Gartner predicts 40% of enterprise applications will feature AI agents by end of 2026, up from less than 5% in 2025. The adoption curve is vertical.
3 million agents deployed in production, only 14.4% with full security approval. Enterprises need tooling before they can scale agent deployments.
Why Oktsec wins this market
Open-source wedge. Aguara is already the most comprehensive open-source AI agent scanner (169+ rules, 15 categories). Community adoption drives distribution.
Data moat. Aguara Watch scans 40,000+ skills across 7 registries every 6 hours. This threat intelligence feeds directly into the detection engine.
Full stack. Only solution that combines pre-deployment scanning, runtime enforcement, cryptographic identity, and audit trail in one product family.
No LLM dependency. Deterministic, pattern-based detection. No API costs, no latency, no hallucination risk. Runs entirely on-premise.
Open source today, enterprise-ready tomorrow.
If you're investing in agent infrastructure, let's talk.