The Security Layer Between Your AI Agents and the Internet

Pipelock gives security teams an enforcement and inspection boundary for AI agent traffic across HTTP, WebSocket, and MCP.

Open source core · Signed releases + SBOM · OWASP mappings published · Proxy + Scan API


Why teams are evaluating agent egress controls now


What Pipelock Is

Pipelock sits between the agent and external systems. It combines traffic inspection with built-in process containment (Linux and macOS) in a single binary. It does not replace model guardrails. It adds a separate runtime security layer covering both the network boundary and OS-level containment.

Agent (secrets, no network) → Pipelock (inspection + policy) → Internet / MCP / APIs

The agent process keeps the credentials but cannot reach the internet directly. Pipelock has full network access but holds no agent secrets. This separation is enforced at the deployment layer: Docker networking, Kubernetes NetworkPolicy, iptables, or macOS PF.


What Pipelock is designed to reduce

Credential exfiltration. 46 DLP patterns across URLs, headers, and request bodies. Decodes base64, hex, URL-encoding, and Unicode evasion before matching. Catches environment variable leaks and secrets split across multiple requests.

Prompt injection in fetched content and tool responses. 6-pass normalization pipeline handles zero-width characters, homoglyphs, leetspeak, and encoded payloads. Scans HTTP responses, MCP tool results, and WebSocket frames.

SSRF and metadata endpoint access. Blocks private IPs, link-local addresses, and cloud metadata endpoints. DNS rebinding protection with post-resolution IP validation.

MCP tool poisoning and rug-pulls. Scans tool descriptions for hidden instructions. Detects mid-session description changes. 17 pre-execution policy rules block dangerous tool calls including reverse shells, credential file access, and persistence mechanisms.

Agent-driven crypto abuse patterns. Address poisoning detection for ETH, BTC, SOL, and BNB with allowlist and similarity scoring. BIP-39 seed phrase detection with dictionary lookup and checksum validation.


Fits into existing agent workflows

ModeWhat It Does
ProxyOutbound HTTP/HTTPS scanning via HTTPS_PROXY. Optional TLS interception for full body inspection in CONNECT tunnels.
MCP proxyWraps stdio, Streamable HTTP, or WebSocket MCP servers with bidirectional scanning. Tool arguments, responses, and descriptions all inspected.
IDE integrationsOne command for Claude Code, Cursor, or VS Code. Hooks or config wrapping, depending on IDE capabilities.
Scan APIPOST /api/v1/scan evaluates URLs, text, or tool calls out-of-band. For orchestrators, CI/CD, SIEM, and approval workflows.
Process sandboxpipelock sandbox -- COMMAND wraps any process with Landlock, seccomp, and network namespace isolation (Linux) or sandbox-exec profiles (macOS, alpha). Per-agent profiles with named filesystem grants.
Reverse proxypipelock run --reverse-proxy scans request and response bodies for any upstream HTTP service.
Config scoringpipelock audit score evaluates security posture across 12 categories (0-100 letter grade).
Attack simulationpipelock simulate runs 31 built-in attack scenarios against your running config (expands with canary tokens).

Use proxy mode in the data plane. Use Scan API when you need a verdict service in the control plane. Use sandbox mode when the agent process needs OS-level containment.


Built for evaluation, control, and auditability

Pipelock Grafana dashboard for fleet monitoring

Fleet monitoring via Grafana. 40 Prometheus metric families, per-agent visibility.


Serious engineering, not a demo


Where Pipelock fits in a defense-in-depth stack

LayerWhat It DoesExample
Container / VM isolationIsolates the agent from the host OSDocker, gVisor, Firecracker
Process containmentRestricts filesystem, syscalls, and network at the OS levelPipelock sandbox (Linux + macOS alpha), NemoClaw/OpenShell
GuardrailsInfluences model behavior inside the inference pipelineNeMo Guardrails, LlamaFirewall
Traffic boundaryInspects and controls what the agent sends over the networkPipelock proxy

Pipelock combines both the process containment layer and the traffic boundary in a single binary. Container isolation and guardrails remain complementary. A container restricts host access. Guardrails shape model outputs. Pipelock handles what the process can touch and what goes out over the wire.


Mapped to how enterprise evaluators think

Pipelock publishes detailed mappings against the OWASP Agentic AI Top 10, OWASP LLM Top 10, OWASP MCP Top 10, NIST 800-53 security controls, and EU AI Act compliance requirements. These are available in the public repo documentation.

For analyst-friendly evaluation frameworks, Pipelock addresses:


Typical evaluation scenarios


Evaluating Pipelock for your team?

We can help scope deployment mode, logging, and policy fit for your environment.