What attacks look like in the graph
Rules match causal chains in a behavioral graph, not isolated log lines. Three canonical attack patterns with reproducible labs live on the scenarios page.
Documentation
Detection engine overview — multi-step causal reasoning and enforcement. For attack scenarios and labs, start elsewhere.
Not the starting page
Rules match causal chains in a behavioral graph, not isolated log lines. Three canonical attack patterns with reproducible labs live on the scenarios page.
CausalGraph · in-process DAG
Rules traverse backward from ★ toward ancestors
Process, file, network, and semantic events are linked into a causal graph per session
Node types
★ = IRExecutionEngine startNode
--- = missing / violation edge
Detection rules
Detects reverse shell attempts spawned outside an approved execution context
MITRE ATT&CK
Two enforcement planes
Behavioral detection runs in the host app (async). Synchronous AUTH decisions in the ES extension still apply on the same events.
Step 1
Endpoint Security and Network Extension capture process, file, and network activity in real time.
Step 2
Raw system events are mapped to semantic actions — file reads, process spawns, network connections, AI tool usage.
Step 3
Actions are linked into a causal graph per session, building a running behavioral score for each agent.
Step 4
Graph-based rules evaluate multi-step attack patterns. Structural checks verify provenance, lineage, and integrity.
Step 5
Scores and enforcement decisions propagate to the sync layer via a zero-copy bridge, taking effect on the next system call.
Rules are organized by complexity — from atomic single-event detections to multi-step causal chains requiring graph traversal. Rules can be managed locally or synced from fleet policy.
Tier 1
Single-event or short-sequence patterns that indicate immediate threats.
Tier 1.5
Graph structural checks: provenance verification, lockfile drift, lineage validation.
Tier 2
Backward graph traversal linking credential access, process spawns, and network egress.
Tier 3+
Session fragmentation, orphaned execution, unverified egress, capability drift.
IR sequence
Walks backward on the causal DAG from the latest event.
Graph invariant
Orphan exec, missing provenance, egress — evaluated on the DAG shape, not sequence alone.
Session score → enforcement
Low
Alert
Med
Throttle
High
Quarantine
Critical
Terminate
Applied on next AUTH_EXEC / NE flow after behavioral ingest
Actions escalate severity → enforcement layer applies the decision on the next system call
Terminate session
critical
Active execution terminated when behavioral score exceeds critical threshold
Quarantine
critical
Session isolated; subsequent actions denied by sync enforcement layer
Ask user
medium
Human-in-the-loop prompt; observation mode shows smart alert only
Throttle
high
Rate-limited execution for high-velocity agent flows
Alert
low
Logged and notified — does not block execution alone
Taint file
low
File flagged for downstream enforcement checks
Severity escalation: alert → throttle → quarantine → terminate
Action classification · 5 signal categories
Process spawning, binary execution, privilege changes, and runtime lifecycle events
File reads and writes, credential access, keychain queries, and security artifact modifications
External and internal connections, DNS queries, data transfer patterns, and beaconing detection
Launch agent creation, daemon modification, security control changes, and system policy edits
AI tool execution, prompt activity, and LLM-initiated data access patterns
25+ semantic action types across all categories
Representative detection rules with severity and category filters.
Tier 1
Single-event or short-sequence patterns that indicate immediate threats.
Detects reverse shell attempts spawned outside an approved execution context
Detects execution crossing a trust boundary without authorization
Detects credential or sensitive file access followed by external network connection
Detects untrusted file drops followed by network egress across process boundaries
Detects dynamic library injection or loading that bypasses code signing
Tier 1.5
Graph structural checks: provenance verification, lockfile drift, lineage validation.
Detects package execution without a verified install event in the causal graph
Detects forged or unverifiable supply-chain lineage in the dependency graph
Tier 2
Backward graph traversal linking credential access, process spawns, and network egress.
Detects credential file access correlated with non-allowlisted outbound connections
Detects rapid runtime pivot after package manager install — common postinstall attack pattern
Detects execution pivoting between runtime languages — a common staging technique
Detects AI tool execution immediately followed by external network activity
Detects AI agent attempting to modify its own configuration or security artifacts
Tier 3+
Session fragmentation, orphaned execution, unverified egress, capability drift.
Detects execution without a verified session root or causal lineage in the graph
Blocks outbound connections from processes with unverifiable causal chains
When multiple rules fire, the engine resolves conflicts by severity priority. Observation mode surfaces detections as smart alerts without blocking execution — letting you tune before enforcing.