The AI agent security market went from a handful of projects to a crowded field in about twelve months. Scanners, firewalls, proxies, gateways, guardrails, governance platforms. The category names overlap, the marketing copy blurs together, and nobody ships a single tool that covers every threat.

This post is a fair, category-by-category tour of 15 tools that are actually shipping in 2026. It is a listicle, but the goal is to be the page other people cite when they explain the landscape. That means honest strengths, honest limits, and no pretending one tool solves every problem.

I build one of these tools, Pipelock. I have tried to write about it the same way I write about everyone else. If you think I missed a strength or oversold a weakness, the repo is public and the tests are public. Open an issue.

Methodology

Five categories, based on where a tool sits in the agent stack and what it inspects:

  1. Runtime firewalls and proxies that inspect traffic content in real time.
  2. MCP scanners that check server configurations before deployment.
  3. MCP gateways that control routing and access between agents and tools.
  4. Governance platforms that manage agents at org scale.
  5. Inference guardrails that sit at the model layer.

Inclusion rules. The tool has to be in active development, shipping code or a hosted service as of April 2026, and aimed at AI agent or MCP security specifically. I left out tools where the parent product has been folded into a larger platform and the standalone name no longer ships. I left in Snyk agent-scan because the Invariant product continues under the new name.

Pricing, funding, and acquisition status come from public announcements. For capabilities I could not confirm in public docs, I say “not documented in public docs” instead of guessing. That is a habit from writing comparison pages. It also keeps the post honest when somebody asks “where did you get that number.”

What each category does

Runtime firewalls and proxies sit in the traffic path. Every HTTP request, every MCP tool call, every response passes through them. They scan content for credential leaks, prompt injection, SSRF, tool poisoning, and related threats. Good ones work on the wire so they cover any agent that makes network calls, not just a specific SDK.

MCP scanners run before you deploy an MCP server or in CI. They check tool descriptions for hidden instructions, look for known-vulnerable packages, flag permission problems, and pin descriptions to detect rug-pulls. They do not sit in the runtime path, so anything that happens during execution is invisible to them.

MCP gateways route traffic between agents and MCP servers. They handle discovery, authentication, access control, transport bridging, and sometimes observability. Most of them do not inspect content. A gateway answers “can this agent talk to this server,” not “is this specific call safe.”

Governance platforms live at the org level. They discover agents running across teams, roll up policies, produce compliance reports, and score risk. They set policy. Enforcement still needs runtime tools in the traffic path.

Inference guardrails wrap the model itself. They classify prompts and completions, block jailbreaks, and filter outputs. They run inside the application, close to the LLM call, and they see text rather than network traffic.

No single category covers the full attack surface. Most real deployments combine at least two.

Runtime firewalls and proxies

1. Pipelock

Open source agent firewall, written in Go, ships as a single binary. Sits between agents and external services as a content-inspecting egress proxy for HTTP and MCP traffic. Scans requests for credential leaks using a DLP engine with multi-layer decoding, scans responses for prompt injection, blocks SSRF, and scans MCP tool descriptions for poisoning and rug-pulls. Wraps MCP servers through stdio or HTTP. Hash-chained audit logging for compliance evidence.

Strengths

Trade-offs

Best for: teams running agents with network access who want open source, content-level egress protection without adopting a vendor SDK.

Links: Pipelock site, GitHub.

2. iron-proxy

Open source Go proxy focused on domain allowlisting for agent traffic. Uses MITM TLS interception to see inside HTTPS traffic. Includes a boundary secret rewriting approach that replaces secrets with placeholders at the proxy edge so the agent only ever handles rewritten values.

Strengths

Trade-offs

Best for: teams that like the secret-rewriting model and want a small, auditable Go proxy they can self-host.

Link: GitHub.

3. Backslash Security

Commercial AI security platform. Raised a reported $27M total ($19M Series A) and ships MCP coverage, DLP, and IDE integration aimed at developer workflows. Focus is on protecting the developer path from source editor through agent tooling, with policies that follow code as it moves through CI.

Strengths

Trade-offs

Best for: engineering orgs that want AI coding assistants and MCP tooling governed the same way they govern the rest of their SDLC.

Link: backslash.security.

4. Promptfoo

Open source LLM testing and red teaming framework with an MCP proxy mode that can intercept tool calls during test runs. OpenAI announced plans to acquire Promptfoo in March 2026; the deal is pending closing as of this writing. Primary use case is evaluation, regression testing, and adversarial red teaming rather than inline production blocking.

Strengths

Trade-offs

Best for: teams building an eval and red team pipeline for LLM apps and agents, especially pre-production.

Link: promptfoo.dev.

5. Nightfall AI

Commercial DLP-first platform. Started in classic SaaS DLP (Slack, Jira, Google Drive) and extended into AI traffic. Markets itself as a firewall for AI, with emphasis on sensitive data discovery, classification, and blocking across AI chat and agent traffic.

Strengths

Trade-offs

Best for: regulated enterprises that already run Nightfall for SaaS DLP and want their AI traffic in the same console.

Link: nightfall.ai.

MCP scanners

6. Cisco mcp-scanner

Open source scanner for MCP servers from Cisco’s AI Defense team. Combines YARA rules with LLM-based analysis to flag tool poisoning, cross-origin escalation, and known vulnerability patterns in tool descriptions and configs.

Strengths

Trade-offs

Best for: teams that want a vendor-backed MCP scanner in CI with both deterministic and LLM-driven checks.

Link: github.com/cisco-ai-defense/mcp-scanner.

7. Snyk agent-scan (formerly Invariant)

MCP scanner originally built by Invariant Labs, acquired by Snyk in 2025. The product continues under the Snyk name and integrates with Snyk’s broader security workflows. Pins MCP tool descriptions and flags changes over time, catching rug-pull patterns. Licensing and deployment options are documented in Snyk’s product pages rather than in a single open-source repo.

Strengths

Trade-offs

Best for: Snyk customers who want MCP scanning in the same dashboard as their existing code security checks.

Link: snyk.io.

8. Enkrypt AI

Commercial AI security platform that includes MCP scanning alongside red teaming and model evaluation. Scans tool descriptions against known attack patterns, with continuous monitoring for changes in deployed servers.

Strengths

Trade-offs

Best for: teams that want MCP scanning and LLM red teaming from one vendor.

Link: enkryptai.com.

MCP gateways

9. Docker MCP Gateway

Open source gateway from Docker that manages containerized MCP servers. Agents connect to the gateway, which routes to servers running in isolated containers. Includes a --block-secrets flag that filters secret-shaped data from tool responses, plus call tracing for observability.

Strengths

Trade-offs

Best for: teams running MCP servers in containers who want Docker-managed isolation and basic secret filtering out of the box.

Link: github.com/docker/mcp-gateway.

10. Runlayer

Cloud MCP control plane. Raised a reported $11M. Hosts MCP servers, manages access control across teams, and provides usage analytics. Aimed at orgs that want a registry and central management rather than running MCP infrastructure themselves.

Strengths

Trade-offs

Best for: teams that want someone else to run MCP infrastructure and would rather pay than patch.

Link: runlayer.com.

11. agentgateway

Open source gateway from Solo.io, recently contributed to the Linux Foundation. Written in Rust. Handles MCP and agent-to-agent traffic with JWT authentication, RBAC, and observability hooks. Positioned as the neutral open source gateway for multi-agent systems.

Strengths

Trade-offs

Best for: teams that want a vendor-neutral, open source gateway they can deploy as a sidecar or ingress in front of many agents.

Link: github.com/agentgateway/agentgateway.

Governance platforms

12. Zenity

Commercial agent security governance platform. Raised a reported $38M Series B. Discovers agents running across an organization, builds an inventory, assesses risk, and enforces policy. Positioned for enterprise programs where the hard problem is “how many agents do we even have.”

Strengths

Trade-offs

Best for: enterprises with many teams shipping agents independently who need inventory and policy before they can even talk about enforcement.

Link: zenity.io.

13. Noma Security

Commercial AI security platform covering model supply chain risk, runtime monitoring, and agent governance. Pitches a single pane of glass across data science and agent workflows.

Strengths

Trade-offs

Best for: orgs that run both classic ML pipelines and LLM agents and want one vendor for both.

Link: nomasecurity.com.

Inference guardrails

14. LlamaFirewall

Open source Python library from Meta’s PurpleLlama project. Provides classifiers for prompt injection, jailbreaks, and unsafe outputs at the model layer. Ships as a library that wraps LLM calls rather than a network proxy.

Strengths

Trade-offs

Best for: Python-native agent stacks that want prompt injection and jailbreak classification close to the LLM call.

Link: github.com/meta-llama/PurpleLlama.

15. NeMo Guardrails

Open source framework from NVIDIA. Uses a DSL called Colang to define conversational rails, safety checks, and topic boundaries for LLM applications. Supports custom actions, integration with other guardrail models, and fact-checking flows.

Strengths

Trade-offs

Best for: teams building conversational LLM apps who want structured, auditable safety rules at the application layer.

Link: github.com/NVIDIA/NeMo-Guardrails.

How to choose

Start with the threat you are actually worried about. The table below maps common problems to the category that solves them first.

If your main problem is…Start with…Examples from this list
Credentials leaking out of agentsRuntime firewall with DLPPipelock, Nightfall, Backslash
MCP server rug-pulls and poisoningMCP scannerSnyk agent-scan, Cisco mcp-scanner, Enkrypt
Prompt injection in tool responsesRuntime firewall with response scanningPipelock
Shadow agents across the orgGovernance platformZenity, Noma
Domain-level egress controlAllowlisting proxyPipelock, iron-proxy
Access control between agents and toolsMCP gatewayDocker MCP Gateway, agentgateway, Runlayer
Jailbreak and unsafe output blockingInference guardrailsLlamaFirewall, NeMo Guardrails
Regression testing and red team automationLLM test frameworkPromptfoo
Compliance evidence (SOC 2, EU AI Act)Audit-logging firewall plus governancePipelock plus Zenity

One team, a handful of agents, limited budget: start with a runtime firewall. It covers the widest attack surface with the least integration cost. Add a scanner in CI once the firewall is stable.

Many teams, hundreds of agents, compliance pressure: start with a governance platform to get an inventory, then deploy runtime firewalls per team to enforce policies the governance platform sets.

Pure research or prototyping: inference guardrails and a test framework are enough. You do not need a production firewall for a notebook.

The layered approach

Every honest security vendor will tell you this: no single tool covers the full attack surface. The categories catch different things.

A real defense stack picks at least two layers. Scanner plus runtime firewall is the most common starting combination. Governance joins when the fleet outgrows spreadsheets. Inference guardrails are extra defense-in-depth for conversational apps. Gateways show up when the MCP surface area gets big enough that routing and access control are their own problem.

Expect to stitch tools together. The market will eventually consolidate, but 2026 is not that year.

Further reading

If I missed a tool that deserves a spot on this list, open an issue on the pipelab.org repo and tell me why. I would rather be corrected than wrong.

Pipelock is an open-source agent firewall. Free forever.