For modern engineering teams

Runtime firewall for AI code workloads

From CI/CD to production workloads, Garnet monitors AI-generated code behavior at runtime, blocking anomalous egress activity. Stop compromised code or rogue AI from leaking data, secrets or phoning home.

How it works

From install to protection in minutes

Deploy Jibril, our lightweight runtime agent, via Helm or GitHub Action to monitor code behavior at runtime in your CI/CD and production workloads. Get instant, automated blocking and alerts for malicious egress activity directly in your workflows (e.g. Slack, GitHub).

One install. Full coverage

Protect your build, staging, and production workloads with one lightweight agent. Install via Helm for Kubernetes clusters or as an Action for CI/CD runners.

Jibril

v2.8

Connected
payments-svc

staging

Online
inference-svc

production

Online
gh-runner-12

build

Offline
Catch behavioral anomalies instantly

Detect real attack behaviors the moment code executes e.g. C2 network calls, reverse shells - all surfaced with kernel-level visibility and source context.

python modified /etc/sudoers
2h ago
python connecting to attacker-c2.com
10m ago
node executed /tmp/malware.sh
45m ago
xmrig miner process spawned
1h ago
node spawned reverse shell
2h ago
python DNS lookup for pool.xmrig.com
3h ago
python connected to 203.0.113.50:8080
4h ago
python spawned interactive shell
5h ago
node executed chmod on /bin/sudo
6h ago
python3 connected to infura.io
7h ago
node anomalous egress → 203.0.113.50:8080
8h ago
python DNS lookup → pool.xmrig.com
9h ago
python modified /etc/sudoers
2h ago
python connecting to attacker-c2.com
10m ago
node executed /tmp/malware.sh
45m ago
xmrig miner process spawned
1h ago
node spawned reverse shell
2h ago
python DNS lookup for pool.xmrig.com
3h ago
python connected to 203.0.113.50:8080
4h ago
python spawned interactive shell
5h ago
node executed chmod on /bin/sudo
6h ago
python3 connected to infura.io
7h ago
node anomalous egress → 203.0.113.50:8080
8h ago
python DNS lookup → pool.xmrig.com
9h ago
python modified /etc/sudoers
2h ago
python connecting to attacker-c2.com
10m ago
node executed /tmp/malware.sh
45m ago
xmrig miner process spawned
1h ago
node spawned reverse shell
2h ago
python DNS lookup for pool.xmrig.com
3h ago
python connected to 203.0.113.50:8080
4h ago
python spawned interactive shell
5h ago
node executed chmod on /bin/sudo
6h ago
python3 connected to infura.io
7h ago
node anomalous egress → 203.0.113.50:8080
8h ago
python DNS lookup → pool.xmrig.com
9h ago
Alert in your workflows

Receive alerts instantly in Slack, Github, or any tool you already use. Every behavioral insight includes runtime context so teams can triage and respond faster.

Behavioral runtime monitoring
for code execution

From CI/CD runners to production workloads, Garnet monitors system activity during code execution, flagging anamolous runtime behaviors that signal compromise or supply-chain attack attempts in real time.

Lightweight runtime agent

Deploy a high-performance eBPF agent in a few clicks, providing deep runtime visibility across any workload where code executes.

Jibril

v2.8

Connected
Agent fleet3
k8s-prod-us-1
Online
gha-runner-eu-17
Warning
k8s-dev-eu-3
Offline

Managed detections, out of the box

From malicious network traffic to file tampering and reverse shells, you get continuously updated detections built from our in-house threat intelligence.

LIVE

Kernel-level behavioral detection & response

High-fidelity runtime behaviors enriched with MITRE ATT&CK context. Stream behavioral insights directly into your workflows e.g Slack, Github, or any tool you already use through our rich API integrations.

Native Tools Integration

Minimal overhead, massive scale

Lightweight eBPF agent runs with near-zero overhead. Protect your code execution workloads at scale without performance trade-offs.

Policies with behavioral context

Every runtime policy is enriched with deep behavioral context to eliminate noise. Clear, actionable insights your team can trust.

Stop threats instantly

Block malicious activity at the kernel before it spreads. Terminate cryptominers, access to C2 servers, and more in real time.

Use Cases

Protection against supply chain attacks

Stop malicious system behaviors and actions triggered by compromised code running in your workloads.

Remote code execution (RCE)

Stop unauthorized code execution (shells, injected processes, or malicious binaries) in your workloads and prevent attacker control.

Privilege escalation

Detect and block attempts to gain elevated privileges, including sudoers tampering and container breakout exploits.

Cryptomining

Terminate unauthorized cryptominer processes and block connections to mining pools in real time.

Command & Control (C2) traffic

Prevent DNS and IP communication with attacker-controlled servers before persistence is established.

Data exfiltration

Monitor and block unauthorized transfers of secrets, credentials, or sensitive data to external destinations.

Vulnerability exploits

Identify and stop runtime exploitation of known and zero-day vulnerabilities before they spread laterally.

Benefits

Why engineering teams choose Garnet

Garnet gives modern engineering teams deep visibility into how code behaves at runtime across workloads, with zero overhead and instant integration into their workflows.

Deploy in minutes

Instant visibility into code behavior at runtime with a single Helm install or GitHub Action. No code changes required.

Insights that matter

Behavioral policy detections cut through the noise, surfacing only meaningful insights tied to suspicious code execution or system activity.

Scale without overhead

Lightweight eBPF agent scales across clusters and runners with very low overhead, designed for production-grade workloads.

Connected
Rogue DNS request blocked

Detections

k8s-prod-cluster • Last 24h

High (8)
Medium (23)
Low (20)

Real-time protection

Block or flag malicious system behaviors in real time before compromised code can spread.

Runtime coverage

Observe every workload for code behavior across CI/CD, staging, and production, with an audit trail for compliance and investigations.

Deploy and forget

Once installed, Garnet monitors in the background 24/7, analyzing system activity at runtime and only alerting when it detects suspicious or compromised code behavior.

Trusted by leading teams

Volt.sh
"There are a lot of tools that process security advisory data, but Garnet is the first I've seen that goes a step further, applying behavioral analysis to find issues before they get reported to an advisory database. This is the kind of thing we'd always wanted to do at npm, Inc., but never got around to. It's super exciting to see it come to fruition."
Isaac Z. Schlueter

Isaac Z. Schlueter

Creator of NPM, cofounder, Volt.sh

Secure your AI code,
ship with confidence

Code runtime security for modern eng teams.

Security

Trust Center