AI Agents Marketplace
Browse and deploy AI security agents to enhance your security posture
Maps effective permissions, groups, and access relationships across cloud and on-prem systems.
EXAMPLE USE CASE
Detects that a contractor in "TempOps" group can access production due to inherited roles via IAM.
Monitors login patterns and usage behaviour to identify risky access activity.
EXAMPLE USE CASE
Flags a dormant user logging into Salesforce with elevated privileges from a new location at 2AM.
Uses AI to analyse real access patterns and suggest permission minimisation.
EXAMPLE USE CASE
Recommends removing s3:PutObject permission for users who haven't used it in 60+ days.
Identifies accounts with effective admin access not explicitly named as admin.
EXAMPLE USE CASE
Surfaces a DevOps user with IAM:PassRole to Administrator roles, allowing privilege escalation.
Analyses bot/service account usage, detects stale tokens, and flags overuse.
EXAMPLE USE CASE
Finds a legacy CI/CD bot with access to all GCP projects and no expiration on its credentials.
Scans git repos, containers, and cloud buckets for leaked secrets and keys.
EXAMPLE USE CASE
Detects a plaintext AWS key committed to a public GitHub repo used by a junior dev.
Monitors AI prompts in real-time and redacts sensitive info before API calls.
EXAMPLE USE CASE
Automatically redacts PII from a user query to an LLM like: "What's Jane Smith's SSN and salary?"
Tracks usage of generative AI models and checks for compliance & explainability.
EXAMPLE USE CASE
Flags a finance team member exporting confidential data to a public LLM without approval.
Monitors join/move/leave events and automates revocation workflows.
EXAMPLE USE CASE
Detects a user still has VPN access 45 days after offboarding; triggers alert and workflow.
Detects configuration drift between intended IAM policies and current state.
EXAMPLE USE CASE
Compares Terraform IAM policy with actual AWS permissions and highlights discrepancy.
Correlates access data, telemetry, and alerts across tools to detect multi-stage attacks.
EXAMPLE USE CASE
Links suspicious GCP IAM role change with data exfil in BigQuery and API