PROXILION

Prevent Insider Threats When Your Employees Have AI Coding Assistants

Open-source MCP security gateway that monitors every tool execution from Claude Code, Copilot, and Cursor. Block credential theft, data exfiltration, and network reconnaissance before execution.

75-85%
Detection Rate
<50ms
P95 Latency
25
Threat Analyzers
10min
Setup Time

The Real Threat

Organizations deploy Claude Code, Copilot, and Cursor to thousands of employees with zero security monitoring.

Disgruntled Employees

Employee gives notice on Friday. Monday morning, they use Claude Code to exfiltrate the entire customer database to a personal S3 bucket before security notices.

Compromised Accounts

Attacker gains access via phishing. Uses GitHub Copilot to scan internal networks, harvest SSH keys, and move laterally before detection systems catch up.

Rogue AI Agents

AI agent exceeds its intended scope and starts accessing production credentials, running network scans, or exfiltrating sensitive files autonomously.

How Proxilion Works

Real-time threat analysis at the Model Context Protocol (MCP) layer. Every bash command, file access, and API call analyzed before execution.

25 Threat Analyzers

Pattern-based detection for reconnaissance tools, credential access, hacking tools, privilege escalation, and exfiltration. Session-aware analyzers track multi-phase kill chains across hours and days.

Real-Time Blocking

Commands scored 0-100. Block threats scoring 70+. Terminate entire sessions scoring 90+. Alert security teams for suspicious activity scoring 50-69.

Kill Chain Detection

Redis-backed session state tracks reconnaissance, credential access, and exfiltration phases. Individual requests may pass, but multi-phase progression triggers termination.

Universal MCP Coverage

Works with Claude Code, Cursor, Windsurf, and any MCP-compatible AI coding assistant. Drop-in proxy with no modifications to AI models.

High Performance

Built in Rust for memory safety and speed. Pattern analysis in <50ms P95. Single instance handles 10,000+ requests/second with predictable latency.

Self-Hosted Security

Not a SaaS product. Data never leaves your infrastructure. Deploy via Docker Compose, Kubernetes, or bare metal. Source code is auditable and modifiable.

What We Actually Catch

Honest detection coverage against sophisticated insider threats

Network Reconnaissance (90-100%)

nmap, masscan, port scans, service enumeration, internal network discovery, multi-port scanning, CIDR range targeting.

Credential Theft (90-100%)

SSH keys, .env files, .aws/credentials, cloud configs, /etc/shadow, database passwords, API tokens, certificate files.

Data Exfiltration (85-90%)

curl to pastebin, large transfers to external IPs, database dumps, compression before transfer, bulk file operations.

Hacking Tools (95-100%)

sqlmap, metasploit, burpsuite, nikto, hydra, john, hashcat, custom exploit frameworks, reverse shells.

Privilege Escalation (85-90%)

sudo abuse, setuid binaries, capabilities manipulation, IAM policy changes, role assumption, container escapes.

Social Engineering (70-80%)

Conversation analysis detects pretexting, authority manipulation, urgency tactics, jailbreak attempts, and context manipulation.

Deploy in 10 Minutes

Docker Compose for single-server deployments. Kubernetes for HA deployments. Terraform for cloud deployments.

git clone https://github.com/clay-good/proxilion
cd proxilion
docker compose up -d
./demo.sh

Gateway running on port 8787. Dashboard on port 3000. Grafana on port 3001.

Ready to Protect Your Organization?

Open source. Self-hosted. Deploy in 10 minutes. 75-85% detection against sophisticated insider threats. MIT license.

Star on GitHub