🛡️Two-Way FirewallInspects tool calls going IN and responses coming OUT. Blocks secrets, private keys, and PII before they reach the agent.
⚡Zero ConfigSensible built-in defaults block credential access, exfiltration, and dangerous shell commands out of the box.
🔍Any MCP ServerWorks with every MCP server — official, third-party, or custom. Protocol-level proxy means zero code changes.
📊Audit LoggingStructured JSON logging of every tool call and response scan with sensitive value redaction. Full audit trail.
🔬Response ScanningDetects leaked API keys, tokens, private keys, database URLs, and PII in server responses. Block or redact automatically.
🚦Rate LimitingGlobal and per-rule rate limits prevent runaway agents from hammering your infrastructure.
📡Real-Time DashboardBrowser-based security dashboard with live event feed, attack panel, kill switch, and rule hit tracking. One flag to enable.
🧬Defense in DepthFive-step inbound pipeline — kill switch, injection detection, SSRF/egress control, policy rules, chain detection. Nothing gets through.