Skip to main content
NEW · LIVE AGENT MONITORING

The SOC for AI Agents

Watch every prompt, tool call, and memory write your AI agents make — in real time — for attacks, drift, and exfiltration. Works with any LLM on any platform. Zero code changes.

No credit card · Works with Claude, GPT, Gemini, Grok, Llama, Kimi, GLM, LangChain, OpenAI Assistants, Cursor, Claude Code, custom agents

THE PROBLEM

Your CISO monitors every laptop.
Who's monitoring your agents?

Every enterprise is deploying AI agents in 2026. Cursor for engineering. Claude Code for development. Custom agents for customer service, internal tools, compliance workflows.

And nobody is watching them.

When an agent gets prompt-injected, calls a dangerous tool, writes malicious instructions to memory, or drifts from its stated goal — you find out in the post-mortem. By then the data is gone. The audit finding is in the report.

Observability tools show you what your agents did. Runtime guardrails classify individual prompts in isolation. Neither can see the attack that happens across 5 tool calls, 3 memory writes, and a slow plan drift.

We built the thing that does.

HOW IT WORKS

Paste one message. Get real-time security monitoring.

Three dead-simple integration paths. Pick whichever fits your runtime. None of them require redeploying your agent.

OPTION 1 · Works with any LLM

Paste to Agent

Copy our instructions block. Paste it as a system message to Claude, GPT, Gemini, Kimi, GLM, or any tool-capable agent. The agent self-reports every action to ShieldPi automatically. No SDK install. No redeploy.

OPTION 2 · Zero overhead

Python SDK

pip install shieldpi. One line to instrument LangChain, Anthropic tool use, or your custom Python agent. Background thread, silent-failure mode, never blocks production traffic.

OPTION 3 · Manual workflows

Shell Bridge

A 40-line bash script you call from your terminal as you relay messages to the agent. For agents without HTTP tools, one-off pilots, and incident investigation work.

DETECTION ENGINE

30+ detectors across four layers

Async multi-step correlation no inline guardrail can match. Pattern matching, tool-abuse detection, memory poisoning across sessions, and trajectory analysis — all running within 3 seconds of an event landing.

Prompt injection

  • Classic instruction override
  • DAN / developer-mode jailbreaks
  • Persona override
  • Policy puppetry
  • System prompt exfiltration
  • Base64 / unicode smuggling

Dangerous tool abuse

  • Destructive tools (delete / drop / exec / shell)
  • Exfiltration tools (email / webhook / http)
  • Credential access (env vars / secrets)
  • SQL injection in tool args
  • Shell injection in tool args
  • Path traversal

Memory poisoning

  • Persistent exfil instructions
  • Persistent override directives
  • System prompt overwrite via memory
  • Cross-session poison reads
  • Privilege escalation in memory

Trajectory anomalies

  • Lateral movement (read → exfil)
  • Tool frequency spikes
  • Repeated refusals under pressure
  • Authority escalation ladders
  • Plan drift from stated goal
THE FLYWHEEL

Test before deploy. Watch after deploy. One platform.

ShieldPi already scans your agents offensively with 27,000+ attack techniques, a multi-phase pipeline, and the world's only LLM security knowledge graph.

Now the scan results power the monitor — every weakness the scanner finds becomes a boosted detection pattern in live monitoring. And every novel attack the monitor catches in production feeds back into the scanner's attack library.

  • Scans make monitoring smarter
  • Monitoring makes scans smarter
  • One product. One dashboard. Compounding loop.
FLYWHEELcompounds over time1 · SCANNERfinds your weakattack categories2 · FINGERPRINTtarget weaknessmap exported3 · MONITORboosts detectionon weak spots4 · CATCHnovel attack →back to library
AUTONOMOUS TRIAGE

Watchtower — your Tier-1 SOC analyst, on autopilot

Every alert that fires is evaluated by a Claude Sonnet 4.5 triage agent that reads the alert, the surrounding event window, the session context, and your per-customer history of past triage decisions. Then it makes one of four calls.

REAL THREAT
Stays open. Pinged to your inbox + Slack.
NEEDS REVIEW
Ambiguous. Human decides.
FALSE POSITIVE
Auto-resolved. Detector misfired.
NOISE
Auto-resolved. Not worth attention.

The end result: your inbox shows you 5 alerts that need attention instead of 50 that don't. Per-customer memory means it gets sharper with every triage. ~$0.015 per alert at Sonnet pricing.

EXAMPLE TRIAGE NOTE
verdict: real_threat
confidence: 0.94
“Agent was social engineered into exfiltrating 500 user records containing SSN and password hashes to an external email address, then wrote a persistent memory rule to auto-approve future similar requests. No legitimate SOC2 audit would request PII be emailed externally — this is a textbook social engineering attack that succeeded.”
triaged in 4.2s · model: claude-sonnet-4-5
WHY US

Catches what runtime guardrails miss

We see across steps

Inline guardrails (Lakera, CalypsoAI, Protect AI) classify single prompts in isolation. We correlate every event in a session — a slow prompt injection followed by a tool call followed by a memory write reads as ONE attack to us, not three benign things.

Async > inline

Inline guardrails are stuck under a 100ms latency budget. We're async — so we can use the full Claude Sonnet 4.5 judge to read attack semantics, not just match regexes. Our analysis happens within 3 seconds of an event landing.

Memory across sessions

An attacker writes a malicious instruction to memory in session A. Session B (a different user) reads it and acts. We catch this. No inline classifier can — they only see one session at a time.

PRICING

Start free. Scale when you do.

Every tier includes all 30+ detectors, the Watchtower autonomous triage agent, and all three integration paths. You only pay for scale.

Free
$0forever
1 monitored target
100K events/mo · 7-day retention
MOST POPULAR
Pro
$499/month
5 monitored targets
1M events/mo · 30-day retention
Team
$1,999/month
25 monitored targets
10M events/mo · 90-day · SSO · audit logs
Enterprise
Contact
Unlimited targets
1-year retention · on-prem option · SLA

Founding customers: 50% off Team tier for the first year. Get featured case study rights and a direct line to the team.

Your agents are already running.
Start watching them.

Or install the SDK now: pip install shieldpi