Five years ago, the security community spent its energy on code humans wrote. Two years ago, on the dependencies that code pulled in. Today, the riskiest software in your company is the agent that just opened a browser and started a workday on your behalf.
The pace of capability has outrun the pace of containment. We gave agents tool calling, then planning, then persistent memory, then computer-use. Each step turned them from “chatbot” into “process with privileges.” None of those steps came with the security model that should have followed.
The patterns that worked for application security don’t fit. SAST scans code humans wrote — agents recompile themselves every run. SCA inspects dependencies declared at build time — agents install tools they discover at runtime. EDR watches a process that doesn’t change much — agents change their own behavior in response to what they read.
We need a different kind of layer. One that sits beside the agent, not inside it. One whose verdicts are signed and replayable. One that’s federated, not gatekept by a single vendor. One the agent has no API for talking out of.
Aegis is the working name for that layer. The five tenets below are the constraints we’re building under.