Skip to content

Agent Security Tooling Landscape — April 2026

We’ve been mapping the agent security space since March 26, 2026, while building Agent Receipts. This page is our working view of the landscape as of April 2026 — the tools, the architectural approaches, the primitives that are converging, and the gaps that remain.

The agent security space has rapidly matured. Every major architectural approach — MCP proxying, egress firewalling, kernel-level enforcement, application-level policy engines, and enterprise gateways — now has at least one serious implementation. Microsoft’s entry (Agent Governance Toolkit, April 2026) is the most comprehensive single project, covering policy, identity, compliance, and SRE across five language SDKs.

The space segments into four layers:

LayerWhat it doesKey players
MCP Gateways (commercial)Managed proxy for MCP traffic with auth, audit, rate limitingMintMCP, Peta, TrueFoundry, Lasso, Gravitee, Traefik Hub
Agent Firewalls (open-source)Intercept + scan agent traffic (MCP and/or HTTP)Pipelock, mcp-firewall (ressl), Agent Wall, mcp-firewall (dzervas)
Kernel-Level EnforcementOS-level syscall interception, sandboxingagentsh / Canyon Road, Anthropic sandbox-runtime
Governance FrameworksApplication-level policy engine, identity, complianceMicrosoft AGT, GitHub Agentic Workflows

Kernel enforcement — agentsh

Egress proxy — Pipelock

MCP gateway — MintMCP / Peta

Governance framework — Microsoft AGT

Agent Receipts — independent audit layer (spans all channels)


Detailed Comparison: Open-Source Agent Security Tools

Section titled “Detailed Comparison: Open-Source Agent Security Tools”

These are the tools most relevant to an individual builder or small team entering the space.

Microsoft AGTPipelockmcp-firewall (ressl)agentsh (Canyon Road)Agent Wallmcp-firewall (dzervas)
ReleasedApr 2026Jan 2026Feb 20262025–2026Feb 20262026
LanguagePython (primary), TS, .NET, Rust, Go SDKsGoPythonGo + system-levelNode.jsRust
LicenseMITApache 2.0AGPL-3.0 (commercial available)Source-available (commercial)MITMIT
ApproachApplication middlewareEgress proxy + MCP proxyMCP stdio proxy + SDK libraryKernel enforcement (Landlock, FUSE, ptrace, seccomp)MCP stdio proxyClaude Code pre-tool-use hook
MCP proxyNo (framework adapters)Yes (stdio)Yes (stdio)No (syscall-level)Yes (stdio)No (hook-based)
HTTP/egress proxyNoYes (7-layer scanner)NoYes (network proxy)NoNo
Shell/command controlNoNoNoYes (shell shim, ptrace)NoNo
File I/O controlNoIntegrity monitoringNoYes (FUSE, Landlock)NoNo
Policy engineYAML + OPA/Rego + CedarYAML configYAML + OPA/RegoYAML policyYAML configJsonnet
DLP / secret scanningNoYes (regex, entropy, env leak)Yes (response scanning)Yes (output redaction)YesNo
Prompt injection detectionMCP scanner moduleYes (response scanning)Yes (8 inbound checks)NoYesNo
Cryptographic identityEd25519 DIDs + ML-DSA-65Ed25519 signingEd25519 audit chainNoNoNo
Audit loggingStructured + OTELJSON + PrometheusJSON + signed hash chainStructured + OTELJSONNo
Compliance reportingEU AI Act, NIST, HIPAA, SOC 2, OWASPOWASP mappingDORA, FINMA, SOC 2NoNoNo
DashboardNoPrometheus/stats endpointYes (web UI)Via Watchtower (commercial)Yes (web UI)No
Framework integrations12+ (LangChain, CrewAI, AutoGen, etc.)Claude Code, CursorClaude Desktop, Cursor, any MCP clientVercel, E2B, Daytona, Cloudflare, etc.Any MCP clientClaude Code, Copilot CLI
Trust modelSame-process middlewareCapability separation (proxy has no secrets)Same-process proxyKernel-enforced isolationSame-process proxyHook-based

Detailed Comparison: Commercial MCP Gateways

Section titled “Detailed Comparison: Commercial MCP Gateways”
MintMCPPeta (Agent Vault)TrueFoundryLasso SecurityGraviteeTraefik Hub
TypeManaged SaaSCredential vault + gatewayAI platform + gatewaySecurity platform + OSS gatewayAPI gateway + MCPReverse proxy + MCP middleware
OSS componentLLM Proxy (partial)NoNoYes (mcp-gateway, Apache 2.0)NoNo
Key differentiatorOne-click deploy, pre-built connectorsZero-trust vault, agents never see raw keysLow latency (3–4ms), 350+ rpsPlugin-based guardrails, PII detection (Presidio)Protocol-aware, method-level governanceExtends existing Traefik deployments
Auth modelOAuth 2.0Scoped time-limited tokensOAuth 2.0 OBOAPI key + pluginsStandard API gateway authStandard Traefik auth
Human-in-the-loopNoYes (approval workflows)NoNoNoNo
ComplianceSOC 2SOC 2VariesGartner Cool Vendor 2024Enterprise certificationsEnterprise certifications
Best forFast deployment, non-security-specialist teamsRegulated industries, credential managementHigh-throughput, perf-sensitive deploymentsSecurity-first orgs wanting OSS flexibilityOrgs already on GraviteeOrgs already on Traefik

GitHub Agentic WorkflowsCloudflare Enterprise MCPGitHub Copilot Agent Firewall
ScopeFull defense-in-depth for GH Actions agentsWAF + AI Gateway for MCP serversDomain allowlist for Copilot cloud agent
ArchitectureKernel isolation + MCP gateway + integrity filteringWAF in front of MCP, portal pattern (N servers → 2 tools)iptables-based egress filtering
Policy modelDeclarative YAML (network, integrity levels)WAF rules + AI Gateway configDomain allowlist (org or repo level)
LimitationsGitHub Actions onlyCloudflare stack onlyOnly covers agent-started processes, not MCP servers; bypassable
NotableTrust-scored content filtering (merged/approved/unapproved)Published April 15, 2026 — their own internal deploymentHonest about limitations in their own docs

ApproachEnforcement guaranteeBypass riskSetup complexityCoverage scope
Kernel-level (agentsh)Strongest — syscall interceptionVery low (requires kernel exploit)High (kernel 6.7+, FUSE, capabilities)Shell, filesystem, network, processes
Egress proxy (Pipelock)Strong for network — capability separationMedium (agent could use alternative channels)Low (single binary)Network egress, MCP responses
MCP stdio proxy (mcp-firewall, Agent Wall)Moderate — protocol-level interceptionMedium (only covers MCP channel)Low (wrap command)MCP tool calls and responses only
Application middleware (Microsoft AGT)Weakest — same trust boundary as agentHigh (agent can bypass if compromised)Low (pip install)Whatever the framework exposes
Hook-based (dzervas/mcp-firewall)Moderate — pre-execution checkMedium (depends on client enforcement)Very lowTool calls in supported clients

Multiple projects have independently converged on the same cryptographic and protocol primitives:

PrimitiveUsed by
Ed25519 signingMicrosoft AGT, Pipelock, mcp-firewall (ressl), Agent Receipts
SHA-256 hash chainingmcp-firewall (ressl), Agent Receipts
DIDs (Decentralized Identifiers)Microsoft AGT, Agent Receipts
OPA/Rego policiesMicrosoft AGT, mcp-firewall (ressl)
Cedar policiesMicrosoft AGT
W3C Verifiable CredentialsAgent Receipts (unique in this space)
OWASP Agentic AI Top 10Microsoft AGT, Pipelock, mcp-firewall (ressl)
YAML policy configAll projects

Agent Receipts (this project) sits outside the enforcement tools in the table above — it is an audit trail, not a policy engine. Its trust model: signing keys live in a separate agent-receipts-daemon process (not in the agent, proxy, or SDK), so the audit trail is independent of the component being audited.


Areas that remain underserved despite the crowded landscape:

GapDescriptionWho’s closest
Unified cross-channel auditCorrelating MCP calls + REST calls + shell commands + browser actions into one timeline per agent sessionCanyon Road (Watchtower) — but commercial/closed
CISO-ready reportingPDF/HTML reports a security team can review to approve agentic AI adoptionmcp-firewall (ressl) has compliance reports; Microsoft AGT has framework mappings; neither produces turnkey CISO artifacts
HTTP/OpenAPI interceptionPolicy-enforced proxy for agent REST API calls (not just MCP)Pipelock (egress proxy); agentsh (network proxy) — but neither is OpenAPI-schema-aware
Browser automation governanceIntercepting Puppeteer/Playwright/CDP actions with policy enforcementNobody (GitHub Copilot firewall explicitly doesn’t cover this)
Policy portability standardA way to express agent policies that works across toolsMicrosoft AGT supports 3 languages but no cross-tool standard exists
Agent identity federationVerifying agent identity across organizational boundariesMicrosoft AGT (SPIFFE/SVID) is closest; still early

Last updated: April 16, 2026