For AppSec, security leadership, and platform teams

Know, control, and prove what AI-assisted engineering can change.

Clyra maps the action-control graph behind AI coding tools: workflow, credential, reachable action, target, approval rule, and evidence pack. Start with a 5-business-day assessment before a central agent registry or gateway exists.

Results in 5 business days from kickoff. Two working sessions. Local/private scan by default.

Example findings

What a Clyra finding looks like.

Findings are redacted and buyer-readable. They show the path from AI-assisted work to authority, action, target, and missing evidence.

Example 01

Release workflow can use standing authority

  • Seen in: CI workflow and release script
  • Action: write, execute, deploy-adjacent
  • Gap: approval or evidence is not visible

Security can decide whether this path needs approval, credential changes, or tighter release policy.

Example 02

MCP or tool path has unclear review boundary

  • Seen in: MCP config, tool manifest, or agent settings
  • Action: call tool, reach internal or external service
  • Gap: owner, purpose, or policy is missing

Platform and AppSec can see which tool paths should be registered, approved, or constrained first.

Example 03

Agent instructions imply privileged delivery behavior

  • Seen in: agent instructions or repo rules
  • Action: deploy, database, cloud, or tool operation hints
  • Gap: review candidate, not confirmed runtime execution

Teams can separate real action paths from review candidates without treating every AI file as an incident.

Example 04

Package script can execute with CI authority

  • Seen in: package script and CI job
  • Action: execute command with repo or cloud context
  • Gap: target and credential review are incomplete

Engineering can keep the workflow while security focuses on the specific command, credential, and target.

What Clyra looks for

The signals that turn AI usage into delivery risk.

The first assessment is not a generic AI inventory. It looks for concrete software-delivery paths where AI-assisted work can reach privileged systems.

AI agents or coding assistants reaching PR-linked workflows
CI jobs that can write, execute, deploy, delete, or publish
MCP servers, tool manifests, and agent configs
Package scripts that execute commands in delivery paths
GitHub tokens, PATs, cloud keys, and service tokens
Cloud, repo, release, or production-adjacent targets
Mutable endpoints or workflows with business impact
Missing owner, purpose, approval, policy, or evidence

System object

The Agent Action BOM is the artifact. The action-control graph is the system view.

Clyra connects the human owner, agent or workflow, credential, action, target, approval rule, policy decision, and evidence so security and platform teams can see where authority becomes operational.

Delegation path
human owner
agent workflow
repo / PR
Authority path
credential
reachable action
target system
Control path
approval rule
policy decision
evidence pack

What you get

A 5-business-day assessment package your security and platform teams can use.

Designed for low lift from your team: two working sessions and a local/private scan by default.

01

Action-control graph

Two to three repos or workflows mapped into owner, workflow, credential, action, target, approval, and evidence paths.

02

High-risk workflow register

AI-assisted paths that can write, execute, deploy, use credentials, or affect cloud and release workflows.

03

Agent Action BOM

Credential and authority summary, owner/purpose gaps, and recommended allow / approve / block policy.

04

Evidence pack

Buyer-readable evidence of actor, owner, credential source, approval decision, validation, outcome, and remaining gaps.

Typical outputs: action-control graph, high-risk workflow register, Agent Action BOM, evidence pack, recommended allow / approve / block policy, and an exec-readable summary.

Why teams care

The question security will be asked.

As AI-assisted engineering moves from suggestions into delivery, the job is to know which workflows can change real systems, what authority they use, and whether the evidence is strong enough to defend later.

For AppSec

Find AI-assisted workflows that create security-relevant change paths before they reach production.

For engineering and platform

Give teams AI speed without creating invisible CI/CD, credential, and release risk.

For security leadership

Answer a customer, auditor, or incident review with evidence, not tribal knowledge.

How it works

From delivery artifacts to decisions security can make.

01

Scan delivery artifacts

Clyra scans repo artifacts, CI workflows, MCP configs, agent instructions, package scripts, credential references, and PR-linked provenance when available.

02

Build the action-control graph

It connects owner, workflow, credential, reachable action, target, approval rule, policy decision, and evidence.

03

Show decisions and evidence gaps

Owner, purpose, approval, policy, and evidence gaps surfaced as an Agent Action BOM and evidence pack.

Field Notes

CAISI is the research layer behind Clyra.

Clyra is informed by CAISI field notes on AI-assisted software delivery, agent authority, MCP/tooling, and security-control drift.

Read Field Notes

FAQ

Questions security teams ask before reviewing AI-assisted delivery paths.

Clyra is intentionally narrow at the start: repo artifacts, PR-linked provenance, CI/CD, tools, credentials, cloud paths, and release workflows involved in AI-assisted engineering.

What is Clyra?

Clyra helps AppSec, security engineering, and platform teams see which AI-assisted workflows can change code, run CI/CD, use credentials, or reach production paths, then shows what approval or evidence is missing.

Will this require access to source code?

The first assessment is designed for local or private scanning. Raw source is not retained unless explicitly agreed. The output is a redacted action-control report, not a source archive.

Can this run locally?

Yes. The early assessment is built around local/private scans so security teams can evaluate sensitive repos and delivery workflows without sending raw source to Clyra by default.

Does this replace secret scanning?

No. Secret scanning finds exposed secrets. Clyra asks a different question: which AI-assisted workflow can use a credential or token to take an action against a repo, CI/CD system, cloud path, tool, or release workflow?

Does this block developers?

The first product is visibility and assessment, not developer blocking. It helps security and platform teams decide which paths should be allowed, approved, changed, or later controlled.

What if we only use Cursor, Claude Code, Codex, or Copilot locally?

Local coding assistants still change the software delivery surface when their output reaches PRs, scripts, CI jobs, MCP configs, credentials, or release paths. Clyra focuses on those delivery artifacts and action paths.

What if we do not use MCP yet?

MCP is only one signal. Clyra also looks at CI workflows, package scripts, agent instructions, repo automation, credential references, GitHub Actions, cloud commands, and release-adjacent paths.

What is an Agent Action BOM?

An Agent Action BOM is a buyer-readable artifact that explains which agent or workflow is acting, where it was introduced, which declared tools or systems it can reach, what credential or identity it uses, what actions are reachable, and what owner, approval, policy, or evidence gaps exist.

How is Clyra different from NHI, IAM, PAM, or agent gateway tools?

NHI, IAM, and PAM tools tell teams which identities and credentials exist. Runtime gateways decide whether traffic or tool calls should be allowed now. Clyra maps the upstream software delivery action-control graph: where the path came from, what authority it carries, what it can affect, and whether approval or evidence exists.

Do we need this if we do not have an internal agent registry yet?

Often, yes. Clyra helps map AI-assisted delivery paths before they become normal infrastructure, so teams know what should be registered, approved, governed, or later enforced.

Who is the first assessment for?

It is for security engineering, AppSec, platform security, DevSecOps, developer productivity, and engineering leaders at software companies already allowing AI-assisted workflows into PRs, CI/CD, tools, credentials, or cloud paths.

Design partners

See whether Clyra is a fit for your AI-assisted engineering setup.

If AI-assisted workflows are already close to your PRs, CI/CD, tools, credentials, or cloud paths, Clyra is looking for evaluation partners.

Request assessment