AgentOps Security

100 posts

AgentOps Security banner
AgentOps Security

AgentOps Security

@AgentOpsSec

The open-source security and observability stack for AI agents.

Entrou em Nisan 2026
2 Seguindo1 Seguidores
Tweet fixado
AgentOps Security
AgentOps Security@AgentOpsSec·
Your AI agents are running shell commands, editing code, opening PRs with zero local guardrails. That is insane. We just dropped a full open source local-first #AgentStack for orchestration. One CLI for scanning, firewall policy, sandboxing, cost checks, review. Works standalone or as a full kit. This is the layer nobody is building and everybody needs. Agents without local guardrails will blow up on you. It's not a question of if. Works with Codex, Claude, Gemini, OpenCode, Cursor, MCP-heavy repos. All outputs stay in local repo files. No hosted service. This is how it should work. The orchestra layer is the actual #AgentOps bottleneck right now. If you're running agents without this you're flying blind. github.com/AgentOpsSec/st…
English
0
0
0
39
AgentOps Security
AgentOps Security@AgentOpsSec·
What's the worst thing your agent has done unsupervised?
English
0
0
0
1
AgentOps Security
AgentOps Security@AgentOpsSec·
Local-first, open-source guardrails between agents and tools are the missing layer. No SaaS dependency. No black box. Just visibility, control, and auditability on your machine. We're building this at agentopssec.com
English
1
0
0
1
AgentOps Security
AgentOps Security@AgentOpsSec·
Your AI agent has root and no supervision. Right now most developers give their coding agents more access than they'd give a new hire. Shell commands. File system writes. API keys. All behind a single "approve" click. Let that sink in. #ZeroTrustAI #AIHasRoot
English
1
0
0
12
AgentOps Security
AgentOps Security@AgentOpsSec·
If you're running scattered agent security tools with no shared context right now, take a look.
English
0
0
0
2
AgentOps Security
AgentOps Security@AgentOpsSec·
Your agent stack isn't insecure because you're missing a tool. It's insecure because your tools don't talk to each other. This is the real #AgentSecurity gap right now and almost nobody is addressing it.
English
1
1
0
0
AgentOps Security
AgentOps Security@AgentOpsSec·
If you're ignoring #AIAgentRisk by wiring MCP servers into production without auditing permissions, you're one bad tool away from a real incident. Check it out: agentopssec.com/mcp-doctor What does your MCP audit process look like right now?
English
0
0
0
17
AgentOps Security
AgentOps Security@AgentOpsSec·
4. Log every tool call. Make it replayable. 5. Review the surface before you run. This is exactly what we built MCP Doctor to solve. Scan before trust. Policy before access. Logs before assumptions.
English
1
0
0
9
AgentOps Security
AgentOps Security@AgentOpsSec·
Most devs plugging MCP servers into their agents right now have zero idea what permissions those tools actually have. Filesystem access. Shell execution. Network calls. All invisible by default. This is a #MCPSecurity blind spot begging to be exploited. Let me break it down.
English
1
0
0
7