Skip to main content
Security for the autonomous workforce

Your AI agents are

running unsupervised.

Quint intercepts every AI agent action at the OS level — visibility, risk scoring, and policy enforcement. No code changes. No developer friction.

Works with every AI agent

AntigravityClaude CodeAnthropic
CursorCursorAnysphere
GithubCopilotGitHub CopilotMicrosoft
WindsurfWindsurfCodeium
KKiroAWS
CodexCodexOpenAI
AAiderOpen Source
ClineClineOpen Source
CContinueOpen Source
AAugmentAugment Code
AntigravityClaude CodeAnthropic
CursorCursorAnysphere
GithubCopilotGitHub CopilotMicrosoft
WindsurfWindsurfCodeium
KKiroAWS
CodexCodexOpenAI
AAiderOpen Source
ClineClineOpen Source
CContinueOpen Source
AAugmentAugment Code
AntigravityClaude CodeAnthropic
CursorCursorAnysphere
GithubCopilotGitHub CopilotMicrosoft
WindsurfWindsurfCodeium
KKiroAWS
CodexCodexOpenAI
AAiderOpen Source
ClineClineOpen Source
CContinueOpen Source
AAugmentAugment Code
AntigravityClaude CodeAnthropic
CursorCursorAnysphere
GithubCopilotGitHub CopilotMicrosoft
WindsurfWindsurfCodeium
KKiroAWS
CodexCodexOpenAI
AAiderOpen Source
ClineClineOpen Source
CContinueOpen Source
AAugmentAugment Code
ZZedZed Industries
GooseGooseBlock
GeminiGemini CLIGoogle
opencodeOpenCodeOpen Source
PPearAIPearAI
TRAETraeByteDance
DDevinCognition
AmpAmpSourcegraph
VVoidVoid
RRoo CodeOpen Source
ZZedZed Industries
GooseGooseBlock
GeminiGemini CLIGoogle
opencodeOpenCodeOpen Source
PPearAIPearAI
TRAETraeByteDance
DDevinCognition
AmpAmpSourcegraph
VVoidVoid
RRoo CodeOpen Source
ZZedZed Industries
GooseGooseBlock
GeminiGemini CLIGoogle
opencodeOpenCodeOpen Source
PPearAIPearAI
TRAETraeByteDance
DDevinCognition
AmpAmpSourcegraph
VVoidVoid
RRoo CodeOpen Source
ZZedZed Industries
GooseGooseBlock
GeminiGemini CLIGoogle
opencodeOpenCodeOpen Source
PPearAIPearAI
TRAETraeByteDance
DDevinCognition
AmpAmpSourcegraph
VVoidVoid
RRoo CodeOpen Source

Quint detects agents automatically — no configuration required.

demo

See Quint in action.

Demo coming soon
quint — endpoint security for AI agents0:00 / 2:30

We're onboarding design partners for Q2 2026. Deploy AI agents and need visibility?

Become a design partner
How It Works

Intent vs. Truth. That's the Signal.

Two independent layers capture what agents claim and what they actually do. The divergence between them is how Quint detects threats no one else can see.

Terminal$ curl -fsSL get.quintai.dev | sh==> Downloading quint v1.5.0...==> Installing to /usr/local/bin==> Generating Ed25519 keypair==> Starting proxy on :9090==> Starting EndpointSecurity sensor✓ Quint ready. Watching for agents.
01

One Command Install

Deploy token from the dashboard, one curl command. Single Go binary starts the TLS proxy and endpoint sensor immediately. No agent config. No code changes.

TWO INDEPENDENT LAYERSINTENT LAYERForward Proxy · TLS MITMtools/call: Bashtools/call: Readmodel: claude-4tools/call: WriteCORRELATETRUTH LAYEREndpointSecurity · KernelEXEC: /usr/bin/gitOPEN: ~/.ssh/id_rsaFORK: pid 4821WRITE: /tmp/out.jsonGap between layers = threat signal
02

Two Layers Capture Everything

The proxy intercepts agent intent — tool calls, API requests, prompts. The EndpointSecurity sensor captures ground truth — file I/O, process exec, network connections, syscalls.

DIVERGENCE DETECTEDPROXY SAYS (Intent)tools/call: Readtarget: config.yamlMISMATCHOS SEES (Truth)OPEN: ~/.ssh/id_rsaOPEN: ~/.aws/credentialsRisk Score:87 CRITICAL→ BLOCKED
03

Divergence Detection

Quint correlates intent vs. truth in real time. When an agent says it’s reading a config but actually touches ~/.ssh/id_rsa — that gap is the signal. No other product sees this.

ED25519 SIGNED AUDIT CHAIN#e8c1Read .ssh/id_rsaBLOCKsig: Ed25519 chain: a91c...f4e2#e8c2Read .aws/credsBLOCKsig: Ed25519 chain: f4e2...0b8d#e8c3Write utils.tsALLOWsig: Ed25519 chain: 0b8d...3a7f#e8c4Bash: npm testALLOWsig: Ed25519 chain: 3a7f...c2e1✓ Chain intact · 4 entries verifiedSOC 2 · EU AI Act · GDPR
04

Enforce & Audit

Block, flag, or allow based on divergence scores and custom policies. Every decision is Ed25519-signed into a tamper-proof audit trail.

the quint approach

Two layers. One truth.

The proxy captures intent. The endpoint sensor captures truth. Quint correlates both to detect divergence — the gap between what agents claim and what they do.

Antigravity Claude Code
Cursor Cursor
CI/CD Pipelines
Cloud VMs
K8s Agents
CLI Tools
Divergence
Behavioral AI
Enforcement
Audit Trail
Fleet View
Risk Scoring
Platform

Everything you need to secure AI agents.

Endpoint-level interception, real-time scoring, policy enforcement, compliance evaluation, fleet management, and a tamper-proof audit trail — from a single daemon.

20+
Agents
6
Detection Layers
6
LLM Parsers
16
Frameworks
LIVE FEEDAGENTTOOLTARGETVERDICTclaudeBashrm -rf /tmpBLOCKcursorRead.env.prodFLAGcopilotWriteutils.tsALLOWclaudeBashnpm testALLOWdevinReadsecrets.ymlBLOCK
01Visibility & Detection

See every agent and every action

All major agent platforms detected automatically through multiple independent signals. Every MCP tool call captured in real time — file reads, API calls, bash commands — enriched with risk scores and compliance analysis.

claudecursorcopilotwindsurfdevingeminiSCAN: 20+ PLATFORMS6 FOUND
02Agent Detection

Know every agent on your network

Six-layer detection stack identifies 20+ AI agent platforms through independent signals — from code signing and process inspection to HTTP headers, system prompt fingerprinting, user-agent patterns, and protocol analysis. Discovers shadow AI, sub-agents, and retroactively reclassifies unknown requests as richer signals arrive.

72COMPOSITE RISK SCOREINTRINSIC28BEHAVIORAL12POLICY45TEMPORAL8EVAL: REAL-TIMEKNOWLEDGE BASE
03Risk Scoring & Enforcement

Score in real time. Enforce at the edge.

Multi-layer composite scoring evaluated against a proprietary compliance engine covering 16 frameworks. Block, flag, or allow fleet-wide with <10ms edge enforcement.

POLICY ENGINE5 RULESPATTERNACTION*.env*BLOCKrm -rf /**BLOCKgit push --forceFLAGnpm installALLOW*.pem, *.keyBLOCK
04Policy Engine

Declarative rules, fleet-wide control

Define policies in the dashboard or describe what you want in natural language — AI-powered policy creation (Claude Sonnet) generates structured enforcement rules from plain English. Match on agent type, tool name, target path, risk score, or time windows. Policies push on heartbeat. Strictest verdict wins.

ED25519 + SHA-256 HASH CHAIN#4a2fHASHe8c1...3d7fACTIONBash:rm#4a30HASH3d7f...a91cACTIONRead:.env#4a31HASHa91c...f4e2ACTIONWrite:cfg#4a32HASHf4e2...0b8dACTIONMCP:push$ quint verify --all✓ Chain valid. 4 entries verified.SOC 2 CC6.1 · GDPR ART.30 · EU AI ACT ART.12
05Audit & Compliance

Tamper-proof evidence, 16 frameworks

Ed25519-signed, SHA-256 hash chain for every action. Exportable proof bundles for auditors. Continuous evaluation against SOC 2, GDPR, EU AI Act, HIPAA, and 12 more frameworks.

QUINTmac-013 agentsmac-025 agentslin-032 agentsmac-044 agentswin-051 agentsmac-066 agentsSPLUNKSLACKPAGERDUTYAPI
06Fleet & Integrations

Every machine. Your existing stack.

Centralized control plane with machine inventory, health monitoring, and agent census. OCSF-formatted event schema ready for SIEM integration. Splunk, Sentinel, Chronicle, Slack, and PagerDuty connectors coming soon. Full REST API.

Compliance

16 frameworks. Continuous evaluation.

Every agent action scored against a proprietary compliance engine covering 16 regulatory frameworks — in real time. EU AI Act enforcement begins August 2, 2026.

Deep Coverage — 45+ rules each
SOC 2
45+ rules
Trust service criteria
EU AI Act
45+ rules
AI risk regulation
OWASP Agentic
45+ rules
Agentic AI Top 10
Supported
GDPR
EU data protection
HIPAA
Healthcare data
PCI DSS
Payment card security
ISO 27001
InfoSec management
ISO 42001
AI management
OWASP Top 10
Web app security
OWASP LLM
LLM Top 10 risks
NIST AI RMF
AI risk framework
NIST CSF
Cybersecurity framework
FedRAMP
Federal cloud security
CCPA
CA consumer privacy
CIS Controls
Security best practices
MITRE ATT&CK
Threat knowledge base
risk engine

Divergence-powered risk scoring. Per agent, in real time.

Quint builds a behavioral profile for every agent individually. When an agent says it's reading a config file via MCP, but the OS sees it accessing ~/.ssh/id_rsa — that divergence is scored instantly.

Scoring is deterministic by default. No LLM in the critical path. No hallucination risk in your security layer.

Multi-Layer Scoring Pipeline

01Intrinsic Action Risk
Deterministic

Every action scored by verb, target sensitivity, and scope against Quint’s canonical taxonomy. No LLM in the loop — deterministic classification, zero hallucination risk.

02Behavioral Baseline
Per-Agent Profiles

Quint builds a behavioral fingerprint for each agent individually. Claude Code touching the network is normal. Claude Code spawning a reverse shell is not. The baseline knows the difference.

03Policy Violation Score
Customer-Specific

Maps every action against SOC 2, GDPR, EU AI Act, HIPAA, and 12 more frameworks. Your compliance posture, applied to agent behavior automatically.

04Temporal Anomaly Modifier
Rate + Sequence + Time

Detects what static rules miss — action velocity spikes, unusual operation sequences, and agents active outside normal windows.

FAQ

Frequently Asked Questions

Secure your agents.
Ship with confidence.

One install. Every agent. Deploy in under 2 minutes. Free for your first two machines.

GET STARTED FREE