Your AI Agent Has Full Access to Your Machine
Every file read, shell command, and network call — unmonitored. grith intercepts every system call from any AI coding agent and evaluates it against 17 independent security filters before execution. Wrap any CLI tool with grith exec.
This Is What Prompt Injection
Looks Like in Practice
A malicious README tells your agent to exfiltrate SSH keys. No prompt, no alert — unless grith is watching.
Intercept. Score. Decide.
Three-step pipeline, under 15ms. Works with any CLI agent — no modification needed.
Intercept
Wrap any CLI tool with grith exec. OS-level syscall interception captures every file open, network connection, and process spawn. No agent modification required.
Score
17 independent security filters evaluate each operation in parallel across three phases. Path matching, secret scanning, taint tracking, behavioural profiling, destination reputation — producing a composite score.
Decide
Composite score routes each call: auto-allow, queue for review, or auto-deny. Ambiguous calls are batched into a quarantine digest — reviewed on your schedule, not one-by-one.
What Developers Actually See
After every agent session, a clear summary. No digging through logs.
Analytics, Audit Trails &
Compliance — Built In
Every tool call logged. Every decision traceable. From cost tracking to enterprise compliance.
Cost Tracking
Per-session, per-model, per-provider cost breakdowns. Set budgets, get alerts before overruns.
Full Audit Trail
Structured JSON logs for every tool call: what was requested, which filters fired, the composite score, and the decision.
Security Analytics
Decision split visualisation, filter hit rates, anomaly trends, and behavioural baselines over time.
Compliance-Ready Audit Trail
Structured audit data designed to support SOC 2, NIST AI RMF, and HIPAA reporting. Deterministic execution traces auditors can read.
SIEM / SOAR Export
Export AI agent security telemetry via webhook and JSON for integration with your existing monitoring stack. Treat AI agent actions like any other security event.
Built for Teams.
Ready for Enterprise.
From two developers sharing a policy to 500 engineers with SSO, RBAC, and air-gapped deployment (Enterprise, planned).
Unified AI Key Management
Add your Claude, OpenAI, OpenRouter, and other API keys to the grith dashboard once. Team members log in to Pro and use any model — no credential sprawl.
Approval Channels
Quarantine digest items routed to Slack, Telegram, web dashboard, or email. Approve, deny, or learn from any device.
Centralised Policy Management
Shared security filter configurations across your team. Update allowlists, scoring thresholds, and path rules from a single dashboard.
Team Dashboard & Usage Analytics
Per-developer cost, security score, and session history at a glance.
SSO / SAML, RBAC & Air-Gapped Deployment (Planned)
Planned for v2.0: single sign-on via Okta, Azure AD, or any SAML provider. Role-based access controls. Full air-gapped and VPC deployments.
No Other Agent Has
Native Security Architecture
The only open-source, model-agnostic tool with per-syscall security evaluation.
| Capability | grith | Cline | Aider | Open Interp. | Claude Code | Codex |
|---|---|---|---|---|---|---|
| Per-syscall interception | ✓ | — | — | — | coarse | container |
| CLI supervisor | ✓ | — | — | — | — | — |
| Multi-filter scoring | ✓ | — | — | — | — | — |
| Quarantine digest | ✓ | — | — | — | — | — |
| Model agnostic | ✓ | ✓ | ✓ | ✓ | — | — |
| Local-first | ✓ | ✓ | ✓ | ✓ | — | — |
| Open source | ✓ | ✓ | ✓ | ✓ | — | ✓ |
| Cost tracking | ✓ | — | — | — | — | — |
| Analytics & compliance | ✓ | — | — | — | — | — |
| Unified AI key management | ✓ | — | — | — | — | — |
| Multi-channel approvals | ✓ | — | — | — | — | — |
Zero Trust Security for
Every AI Agent
Per-syscall interception, multi-filter scoring, and quarantine digests — for any CLI agent. Open source. Local-first. Launching soon.