Watch what they read, see what they send, gate what shouldn't leave.
The agent profiles ship with the app: Claude Desktop, ChatGPT, GitHub Copilot, Cursor — plus integration profiles for Burp+MCP, IDE plugins, browser-agents, and pentest-copilots. rAIzr knows their data paths, their endpoints, their MCP-handoffs, and what "normal" looks like for each. When an agent steps off the path, rAIzr classifies it: info, warn, critical.
Every event is attributed to the originating process. FSEvents alone can't do that — it tells you what changed, not who changed it. ESF plugs into the kernel and gives you per-process file, network, and process-execution events, in real time. Outbound LLM calls and MCP traffic are parsed at endpoint, classified, and — when policy requires — redacted or blocked before the bytes leave the box.
- Per-process attribution via Endpoint Security Framework
- LLM-egress monitoring — every agent call to
api.anthropic.com,api.openai.comet al. parsed and classified at endpoint - MCP-traffic capture — JSON-RPC over stdio/sse/websocket, per-process attribution, manifest scanning
- Browser-agent observation — Claude in Chrome, agent-extensions, MCP-bridges into browsing sessions
- Credential-store identification — Keychain access,
~/.ssh,~/.aws,~/.config, cookies-jars,.env/.npmrc/.netrc - File / network / process telemetry — local SQLite, encrypted at rest
- Live menubar status: clear / scanning / warn / critical
- Workflow-tool profiles — Burp+MCP, IDE-plugins, pentest-copilots, browser-agents
- MCP server scanner — detects unauthenticated exposures + manifest prompt-injection
- TCC permission auditor — knows which agents talked their way past you
- Zero cloud. Telemetry never leaves the device.