0 ms
is the average latency between an agent reading malicious content and acting on it.
Indirect prompt injection bypasses every existing AppSec layer because the attack lives in data the agent was told to trust.
Your agents read the open web, install tools they discover at runtime, and write to memory you can’t inspect. Aegis is the layer that watches them, verifies them, and contains them— built so trust in agents can be proven, not assumed.
The premise
Today’s app-security stack was built for code that humans ship. Agents are code that ships itself, recompiles itself, and is steered by whatever it reads on the open web in the last 200ms.
Aegis assumes the agent is the new endpoint, the new supply chain, and the new attack surface — all at once.
0 ms
is the average latency between an agent reading malicious content and acting on it.
Indirect prompt injection bypasses every existing AppSec layer because the attack lives in data the agent was told to trust.
12+
agent frameworks ship to production with no runtime sandbox.
Most agents inherit the operator's full shell, browser, mailbox and credentials. The blast radius of a compromise is the user's life.
∞
is the half-life of a poisoned memory entry.
Once an attacker writes to a vector store an agent re-reads each turn, the compromise persists across sessions, machines and even teammates.
The platform
Each Aegis layer ships independently and emits the same evidence format. Adopt the one that hurts most today; compose the rest as your agents earn more privilege.
A 360° guard for the agent process.
Local CLI that audits an agent's runtime: scans installed tools, isolates compromised environments, scrubs leaked credentials and sweeps the agent's working memory between tasks.
TLS, but for whether a site is safe to feed to an agent.
A signed attestation layer that classifies websites and tools by adversarial risk before your agent loads them. Block prompt-injection traps, typo-squatted tools, and content farms designed to hijack agents.
Hygiene for agent memory — long-term, episodic, vector.
Detects and removes poisoned entries inside agent memory stores. Differential checkpoints, tainted-trace recovery, and policy-as-code rules for what may persist between sessions.
An adversarial benchmark agents must pass before they ship.
Versioned suites of red-team scenarios: tool-poisoning, indirect prompt injection, exfiltration via memory, social-engineered escalation. Get a verifiable score, not a vibes-based audit.
Architecture
Aegis runs as an out-of-process supervisor — not as middleware inside the agent loop. The agent can’t bypass it, prompt it, or talk it into stepping aside. Every read from the web, every write to memory, every tool spawn passes through a verified control plane.
Observe
All inputs, tool calls, memory reads/writes are mirrored to a tamper-evident log.
Verify
Each event is checked against attestation, policy, and adversarial classifiers in <2ms.
Contain
On signal, Aegis quarantines the agent, snapshots state, and rolls memory to last clean checkpoint.
Diagram · 1.0
Coverage on day one
No SDK rewrite, no proprietary runtime. Aegis attaches at the process and network boundary; existing frameworks light up immediately.
A short history of why we’re here
Tool calling
Agents could call APIs.
Multi-step
Agents could plan across calls.
Persistent memory
Agents remembered between sessions.
Autonomous workdays
Agents operate the user's machine for hours, unsupervised.
Aegis
A security layer that operates beside them, not after them.
Manifesto, in five lines
An agent is a privileged user. Treat it like one.
If a finding can’t be reproduced, it isn’t a finding.
The web is hostile by default — agents must opt in to read it.
Memory is not infrastructure. It’s an attack vector.
Security for agents must be invisible to the human and inevitable to the agent.
Next move
Reserve a slot in the early-access program. We pair with twelve teams in 2026 — pick one threat model, ship verifiable evidence in a week.