Skip to main content

AI Agent Security Graph

The Security Graph (F2) provides a real-time force-directed visualization of your AI agent ecosystem with automated MITRE ATT&CK risk path detection across 33 behavioral patterns and 14 tactics.

Overview

The Security Graph continuously analyzes agent actions to detect multi-step attack patterns. Each action evaluation triggers the risk path analyzer, which runs all 33 detectors against the last 24 hours of activity using a single-fetch architecture (2 database queries total).

Key Capabilities

  • Force-directed graph visualization — D3.js interactive layout showing agents, MCP servers, external systems, and their connections
  • 33 MITRE ATT&CK risk path patterns — from prompt injection to financial manipulation
  • 14 tactics coverage — Initial Access through Impact, plus Reconnaissance and Resource Development
  • Real-time WebSocket updates — new detections push to the UI instantly
  • PDF export — compliance-ready reports with executive summary, MITRE coverage matrix, and audit trail
  • Acknowledge workflow — SOC analysts can acknowledge, resolve, or mark false positive with full audit logging

Node Types

ShapeTypeColorDescription
CircleRegistered AgentGreen/Amber/RedRisk-colored by avg_risk_score
HexagonMCP ServerPurple (#8B5CF6)MCP-registered agents
DiamondExternal SystemAmberTarget systems (databases, APIs, tools)
Dashed CircleDiscovered AgentGray (#6B7280)Unregistered agents from F1 Discovery

Node Sizing

Node size scales with action count: max(16, min(48, floor(sqrt(action_count) * 8))).

33 Detection Patterns

Initial Access (TA0001)

#PatternTechniqueSeverity
1Prompt InjectionT1190CRITICAL
2Credential AbuseT1078CRITICAL

Execution (TA0002)

#PatternTechniqueSeverity
3Unauthorized MCP ToolT1059HIGH
4Code Outside ScopeT1059.006HIGH
5Chained Tool CallsT1106HIGH
8Scheduled Task No ApprovalT1053HIGH

Persistence (TA0003)

#PatternTechniqueSeverity
6Reregistration After KillT1136HIGH
7Policy Override RestartT1547HIGH

Privilege Escalation (TA0004)

#PatternTechniqueSeverity
9RBAC AssumptionT1548CRITICAL
10Read-to-Write EscalationT1068CRITICAL

Defense Evasion (TA0005)

#PatternTechniqueSeverity
11Token ReuseT1550HIGH
12Audit Log SuppressionT1562.002CRITICAL
13Action SplittingT1027HIGH

Credential Access (TA0006)

#PatternTechniqueSeverity
14API Key ExfiltrationT1552CRITICAL
15Secrets via MCPT1555CRITICAL

Discovery (TA0007)

#PatternTechniqueSeverity
16Environment EnumerationT1082HIGH
18Agent FingerprintingT1018HIGH

Lateral Movement (TA0008)

#PatternTechniqueSeverity
24Cross-Agent Tool SharingT1563HIGH
25Cross-Tenant AccessT1550.002CRITICAL

Collection (TA0009)

#PatternTechniqueSeverity
17Schema ProbingT1213HIGH
19Data AggregationT1074HIGH
20Bulk ExportT1005HIGH
21Cross-Resource CorrelationT1213.002HIGH

Exfiltration (TA0010)

#PatternTechniqueSeverity
26Unregistered Endpoint TransferT1041CRITICAL
27Volume AnomalyT1048HIGH
28Staged ExfiltrationT1030HIGH

Command and Control (TA0011)

#PatternTechniqueSeverity
22Unregistered External APIT1071HIGH
23Non-Whitelisted DomainT1071.001HIGH

Impact (TA0040)

#PatternTechniqueSeverity
29Destructive WriteT1485CRITICAL
30Financial ManipulationT1657CRITICAL
31Resource HijackingT1496HIGH

Reconnaissance (TA0043)

#PatternTechniqueSeverity
32Org EnumerationT1591HIGH

Resource Development (TA0042)

#PatternTechniqueSeverity
33Autonomous Agent RegistrationT1586HIGH

Architecture

Single-Fetch Pattern

All 33 detectors operate on a pre-fetched window of data:

  1. Fetch actions — one query pulls all agent_actions for the org in the last 24 hours
  2. Fetch agent configs — one query pulls all registered_agents configuration
  3. Run 33 detectorsasyncio.gather runs all patterns concurrently against in-memory data
  4. Persist detections — new detections written to risk_path_detections with deduplication

Performance target: < 500ms for all 33 patterns.

Pipeline Integration

The risk path analyzer runs as a fire-and-forget background task after every action evaluation:

asyncio.create_task(_f2_analyze())

This never blocks the action response — detections appear asynchronously.

Quick API Access

All endpoints verified live. Authentication: API key or JWT session token.

MethodPathDescription
GET/api/v1/graph/summaryGraph overview — node count, risk distribution
GET/api/v1/graph/nodesAll nodes with risk scores and relationships
GET/api/v1/graph/risk-pathsActive risk paths between agents and resources
GET/api/v1/graph/exportFull graph export (JSON)
POST/api/v1/graph/risk-paths/acknowledgeAcknowledge a risk path

Example:

curl -H "X-API-Key: your_api_key" \
https://pilot.owkai.app/api/v1/graph/summary

For the complete endpoint reference including request/response schemas see the Security Graph API page.

API Reference

See Security Graph API for the full endpoint and WebSocket reference.

Compliance

StandardControlImplementation
SOC 2 CC7.2Security Event Monitoring33 automated detection patterns
SOC 2 CC7.3Incident ResponseAcknowledge/resolve workflow with audit trail
NIST SI-4System MonitoringContinuous behavioral analysis
NIST IR-5Incident MonitoringReal-time WebSocket alerts
NIST AI RMF MAP-3AI System MappingAgent ecosystem visualization
NIST AI RMF MEASURE-2Risk MeasurementConfidence-scored detections
NIST AI RMF GOVERN-4AI GovernanceHuman-in-the-loop acknowledge workflow