Runtime security · OWASP ASI · NIST AI RMF

Runtime security for cloud/ops AI agents

Runtime guardrails, task-scoped credentials, and an immutable audit trail so your agents ship faster without touching prod.

Built by ex-engineers from HPE and Meta.

Self-hosted or managed. Your audit trail never leaves your VPC.

BLOCKaws:s3:DeleteBucketCRITICAL
ALLOWaws:ec2:DescribeInstancesREAD
APPROVALaws:iam:AttachRolePolicyDESTRUCTIVE
ALLOWgcp:storage.buckets.getREAD
BLOCKaws:rds:DeleteDBInstanceCRITICAL
ALLOWaws:logs:PutLogEventsWRITE
APPROVALgcp:resourcemanager.setIamPolicyDESTRUCTIVE
BLOCKaws:iam:CreateAccessKeyCRITICAL
ALLOWazure:containers.getREAD
ALLOWaws:sqs:SendMessageWRITE
APPROVALaws:ec2:TerminateInstancesDESTRUCTIVE
BLOCKgcp:bigquery.jobs.createCRITICAL
BLOCKaws:s3:DeleteBucketCRITICAL
ALLOWaws:ec2:DescribeInstancesREAD
APPROVALaws:iam:AttachRolePolicyDESTRUCTIVE
ALLOWgcp:storage.buckets.getREAD
BLOCKaws:rds:DeleteDBInstanceCRITICAL
ALLOWaws:logs:PutLogEventsWRITE
APPROVALgcp:resourcemanager.setIamPolicyDESTRUCTIVE
BLOCKaws:iam:CreateAccessKeyCRITICAL
ALLOWazure:containers.getREAD
ALLOWaws:sqs:SendMessageWRITE
APPROVALaws:ec2:TerminateInstancesDESTRUCTIVE
BLOCKgcp:bigquery.jobs.createCRITICAL

Every agent with real permissions is one prompt away from a CISO's worst day.

Without a runtime gate, a single prompt injection or a bad autonomy loop can become a production incident in seconds.

Your agent just deleted a production bucket.

One malformed tool call, no rollback, CISO on the phone.

Your agent leaked a long-lived IAM key.

Same key across envs, no rotation, 90 days of blast radius.

Your audit log has no idea who touched what.

Auditors ask, 'which agent?' and you have no answer.

Built for production agents

Runtime security that meets your agents where they are.

Four pillars behind every Tracehold deployment.

01

Wired into your stack

Tracehold sits between your agent framework and the systems it touches, without rewriting either one.

stack integration
Agent frameworks
PythonLangChainOpenAIClaude Agent SDKand any framework that exposes tool calls
tracehold sits in between
Target environments
AWSGCPAzureand anywhere else your agents take action
02

Context before action

Every action is assessed against your real environment, not a static rulebook.

runtime context
EnvironmentBlast radiusAgent trust
↓ ↓ ↓
agent action
assessed in real time
↑ ↑ ↑
Prior behaviorHuman intentCompliance scope
03

Guardrails that explain themselves

Risky actions are paused with a plain-English reason and, where possible, a safer path forward.

explainable outcome
guardrail held
A risky action was paused before it reached production.
A human was looped in only because it mattered. Everything else ran on its own.
why this was held
ReasonEnvironment match
ImpactHigh
Safer pathAvailable
04

Audit-ready from day one

Every decision is permanently recorded and tied back to the compliance controls it satisfies.

verifiable record
sealed
sealed
sealed
sealed
ImmutableCryptographically verifiableCompliance mappedExport ready
Live product

One dashboard for every agent action, classified and scored.

app.tracehold.ai/dashboard
Tracehold dashboard showing security posture score 72, 17 intercepted actions, 4 open alerts, 2 pending approvals, and a decision breakdown split across allow, block, and requires-approval.
Product

Everything you need to run agents in production.

Six primitives, one platform.

Single enforcement gateway

One enforcement point between your agent and the infrastructure it touches. Every action classified, every action decided, nothing slips through.

JIT task-scoped credentials

Short-lived credentials issued per task through your provider's native identity federation. They live for the length of the task, then evaporate.

Immutable audit trail

HMAC-SHA256 hash-chained, append-only. Tamper-evident by construction. Export-ready for SOC2, NIST SP 800-53, and OWASP ASI evidence.

Trust scoring + taint tracking

Every agent gets a continuous trust score. Prompt injection, context poisoning, and tainted inputs lower the ceiling in real time.

Context-aware blast radius

Every action is scored against your real environment, not a generic model. Tracehold knows when a routine call becomes a production incident.

LLM-backed safer alternatives

When an action is blocked, Tracehold suggests a safer alternative, curated for known actions, LLM-generated for novel ones.

Red team

Your agents are re-tested against real attacks on every deploy.

Tracehold replays a library of adversarial scenarios against your real pipeline and catches regressions before they reach production.

Runs on every deployOWASP ASI alignedRegression blocked
adversarial run
last deploy
Attack scenarios
Prompt injectionTool misuseContext poisoningRogue retriesUnsafe delegationCascading failures
replayed on your pipeline
Run verdict
HeldHeldHeldRegressionHeld
Compliance

Built around OWASP ASI and NIST AI RMF from day one.

Every decision is tagged with the OWASP risk it addresses and the NIST control it satisfies.

OWASP Top 10 for Agentic Applications 2026

ASI01Goal Hijack
ASI02Tool Misuse
ASI03Identity Abuse
ASI04Supply Chain
ASI05Code Execution
ASI06Context Poisoning
ASI07Inter-Agent Comms
ASI08Cascading Failures
ASI09Trust Exploitation
ASI10Rogue Agents

Live runtime defenses

  • Prompt-injection detection
    ASI01
  • Tainted-input blocking on critical actions
    ASI02
  • Burst and runaway-agent rate controls
    ASI04
  • PII and secret leakage prevention
    ASI06
  • Critical-action approval enforcement
    ASI08
  • Rogue-agent retry loop detection
    ASI10
NIST AI RMFNIST SP 800-53GDPR-ready

For platform engineers

Wire the SDK once. Your agents get safer, you ship faster.

  • One-line Python wrapper for LangChain + Claude Agent SDK
  • Runs in observe mode on day one, zero production risk
  • Hot-reloadable rules, no redeploy to tune
  • OpenTelemetry spans on every decision, traceable in Jaeger

For security engineers & CISOs

Every agent action, classified, gated, audited.

  • OWASP ASI01–ASI10 anomaly detectors built in
  • Immutable hash-chained audit trail, exportable to S3
  • Trust scoring and taint propagation for prompt injection defense
  • Evidence bundles mapped to NIST SP 800-53 controls

FAQ

Common questions

If your question isn't here, reach out or book a demo.

Does Tracehold sit in the data path between my agent and the cloud?

Yes. Tracehold acts as a single enforcement gateway that intercepts every tool call before it reaches your cloud provider. Every action is classified by risk level, evaluated against your policies, and either allowed, blocked, or held for human approval. You can also run in observe-only mode to start without blocking anything.

Which cloud providers and agent frameworks do you support?

AWS, GCP, and Azure have first-class support with native credential federation. We also support DigitalOcean, Hetzner, Cloudflare, and any provider with a REST API through custom classifier rules. On the agent side, we ship SDK wrappers for LangChain, Claude Agent SDK, OpenAI Agents SDK, and CrewAI, plus a generic Python client for custom frameworks and internal tools.

What happens if the Tracehold gateway goes down?

Tracehold supports configurable fail modes per organization. You can choose fail-open (agents continue with logging only) or fail-closed (agents are paused until the gateway recovers). Most production deployments use fail-closed for critical workloads and fail-open for non-critical ones.

Is Tracehold self-hosted or managed?

Both. You can self-host Tracehold in your own VPC so your audit trail and credentials never leave your infrastructure, or use our managed deployment. The entire stack runs on Docker Compose with PostgreSQL, Redis, and an OpenTelemetry collector.

How is Tracehold different from a WAF or prompt injection filter?

WAFs and prompt filters protect the input side. Tracehold protects the output side: the actual cloud actions your agent takes. We classify every tool call by risk and blast radius, issue short-lived credentials scoped to each task, and maintain a tamper-evident audit trail. Think of it as IAM and audit for AI agents, not another input filter.

Does Tracehold align with OWASP and NIST standards?

Yes. Tracehold is built around the OWASP Top 10 for Agentic Applications 2026 (ASI01 through ASI10) and maps every gateway decision to NIST SP 800‐53 controls (AC-6, AU-2, AU-12, CM-5, IA-9, SC-28, SI-7). The immutable audit trail exports as compliance evidence for SOC 2 and NIST AI RMF assessments.

See Tracehold running against your stack.

30-minute demo. We run your real agent workflow through the gateway against a sandboxed copy of your stack.