Endpoint Security for the AI Era

Know what AI agents actually do on your machines.

AI coding assistants execute arbitrary code on Windows workstations with almost no oversight. AI Trace provides security teams with deep, kernel-level runtime visibility into every process, file write, network call, and registry modification.

Request Early Access Learn More

The Problem

AI agents operate in a blind spot

AI coding agents spawn processes, write files, make network connections, and modify system state. Traditional endpoint security tools weren't built to attribute these actions back to the agent that initiated them.

Untracked Execution

Arbitrary shell commands

Agents spawn PowerShell, cmd, and other interpreters to run generated code. These child processes inherit user-level privileges with no audit trail linking them back to the agent session.

Data Exposure

Sensitive file access

Nothing stops an agent from reading SSH keys, cloud credentials, auth tokens, environment variables, or any file the user has access to. Standard EDR won't flag it because the user account is authorized.

Exfiltration Risk

Unrestricted network access

Agent-spawned processes can make outbound HTTP requests, resolve arbitrary DNS, and establish connections to external endpoints. There is no built-in mechanism to restrict or even log this behavior.

Persistence

System state modification

Agents can write to the registry, create scheduled tasks, modify startup items, and alter system configuration. These changes persist long after the agent session ends.

Supply Chain

Untrusted code execution

Agent-generated code runs immediately on the workstation. Dependencies are fetched and installed without review. Build scripts execute in full user context with no sandboxing.

No Attribution

Invisible agent provenance

When an agent spawns a child process that spawns another child, the origin is lost. Security teams can't tell if powershell.exe was launched by a human or by an AI agent three levels up the process tree.


0%
of EDR tools attribute actions to AI agents
100%
of agent commands run at user privilege level
Kernel
level event collection via ETW
<1%
CPU overhead on monitored workstations

Capabilities

Full-stack agent telemetry

Built on ETW (Event Tracing for Windows) at the kernel level. No userland hooks to bypass. No API interception. High-fidelity event streams straight from the OS kernel, correlated and attributed to the originating AI agent.

ETW

Kernel-Level Event Collection

Direct ETW consumer sessions capturing process, file, registry, network, and image load events from kernel providers. Tamper-resistant by design. No injection, no hooks, no blind spots.

TREE

Process Tree Attribution

Automatic identification and full tree-walking of AI agent process hierarchies. Every child process, grandchild, and ephemeral shell is tracked and attributed back to the originating agent session and PID.

NET

Network Telemetry

Captures outbound TCP/UDP connections, DNS resolutions, and TLS handshake metadata from agent process trees. Full visibility into which endpoints agent-spawned processes communicate with, including SNI and certificate details.

FS

File System Monitoring

Real-time tracking of file create, write, delete, rename, and read operations. Configurable alert policies on access to sensitive paths: SSH keys, credential stores, cloud config, environment files, and certificates.

REG

Registry Monitoring

Monitors all registry reads and writes from agent process trees. Detects persistence mechanisms (Run keys, scheduled tasks), configuration changes, security policy modifications, and COM object registration.

IMG

Image Load Tracking

Logs every DLL, driver, and executable image loaded by agent processes. Detects DLL sideloading, unsigned module loads, and unexpected runtime dependencies introduced by agent-generated code.

CMD

Command-Line Capture

Full command-line argument logging for every process in the agent tree, including encoded PowerShell commands, script arguments, compiler flags, and package manager invocations. Decoded and normalized for analysis.

SIEM

SIEM & SOAR Integration

Structured JSON event output with consistent field mappings for direct ingestion into Splunk, Microsoft Sentinel, Elastic, CrowdStrike LogScale, or any SIEM. Pre-built correlation rules and detection templates included.

POLICY

Configurable Alert Policies

Define rules for what triggers alerts: sensitive file access, network connections to unexpected destinations, registry persistence writes, unsigned image loads, or any combination. Tunable per agent type and workstation group.


How It Works

From kernel event to actionable alert

AI Trace operates as a lightweight Windows service that consumes kernel ETW events in real time, correlates them against known AI agent process signatures, and emits structured telemetry.

01

Agent Detection

Identifies running AI coding agents by process name, path, and behavioral signature. Maintains a live registry of active agent sessions and their root PIDs.

02

ETW Collection

Kernel-level ETW sessions capture process, file, registry, network, and image load events in real time. Filtered to agent process trees with minimal overhead.

03

Correlation

Events are enriched with agent session context, process tree depth, and parent attribution. Related events grouped into coherent agent action sequences.

04

Policy Evaluation

Each event evaluated against configurable alert policies. Sensitive file access, unexpected network destinations, and persistence mechanisms trigger real-time alerts.

05

Emit & Forward

Structured JSON events emitted to local log, forwarded to SIEM, or pushed via webhook. Full provenance chain from kernel event to agent session preserved.


Event Coverage

Comprehensive event capture

AI Trace captures granular telemetry across the full scope of what an AI coding agent can do on a Windows workstation. Every event is attributed to the originating agent session.

Process creation & termination
Full command-line arguments
Process tree reconstruction
File create / write / delete / rename
Sensitive file read detection
Outbound TCP/UDP connections
DNS resolution logging
TLS handshake metadata
Registry key create / write / delete
Persistence mechanism detection
DLL & module image loads
Unsigned binary detection
Named pipe creation
Token & privilege changes
PowerShell command decode
Clipboard access monitoring
Environment variable reads
Service installation events
Scheduled task creation
WMI event subscriptions

Compatibility

Built for the agents your teams use

AI Trace detects and monitors all major AI coding agents on Windows. New agent signatures are added continuously as the ecosystem evolves.

Claude Code
Anthropic
GitHub Copilot
Microsoft / GitHub
Cursor
Anysphere
Windsurf
Codeium
Codex CLI
OpenAI
Aider
Open Source
Continue
Open Source
Custom Agents
Configurable signatures

Ship AI-assisted code with confidence.

AI Trace is in private early access. If your organization uses AI coding agents on Windows workstations and needs endpoint-level visibility into their runtime behavior, get in touch.

Request Early Access