Why Tyr?
The problem
AI coding agents and autonomous LLMs now run with full user privileges on developer laptops, build servers, and production VMs. In practice this means:
- Credential exposure.
~/.aws/credentials,.envfiles, SSH keys,ghtokens — all readable. - Silent exec.
curl | bash,rm -rf, arbitrary shell commands from a single misread instruction. - Opaque LLM traffic. Outbound calls to OpenAI, Anthropic, or any provider — with whatever context the agent chose to send.
- No fleet visibility. You have 50 engineers running Cursor. You can’t answer “did any of them leak source to a third-party LLM today?”
There is no Falco for AI agents. No unified policy layer that says:
“My Cursor instance can read the repo but not
~/.ssh, can callapi.openai.combut not random domains, and must ask beforesudo.”— across every machine in the fleet.
Why existing tools fall short
| Tool | Problem |
|---|---|
| LLM SDKs with guardrails | Only catch what the agent tells you. Bypassed by any subprocess call. |
| Container sandboxes | Developers won’t run their AI agents inside containers for latency + UX reasons. |
| Network firewalls | Can’t distinguish api.openai.com from openai-exfiltrator.example.com on IP alone. |
| Audit logs (auditd / OSQuery) | Observability only — no enforcement, no AI semantics. |
| Falco / Tetragon | Runtime security primitives, but no AI-agent awareness and no central policy plane. |
Why kernel-level?
Because anything above the kernel is bypassable.
- LD_PRELOAD: the agent can
unsetenv("LD_PRELOAD")orexeca stripped binary. - ptrace: detectable and skippable.
- Seccomp: too coarse — no path-based deny rules.
- Language-level guardrails: only apply to that runtime.
eBPF runs in the kernel, sees every syscall, and denies before the call completes. It’s the only layer that’s both universal and non-bypassable from userspace.
Why Cedar?
Cedar is Amazon’s open-source policy language originally built for IAM and Verified Permissions. It’s:
- Declarative — says what, not how.
- Proven — backed by formal verification.
- Fast — evaluates thousands of rules per millisecond.
- Boring — in the good way. No custom DSL for us to maintain.
Tyr lets you author in a friendly YAML and compiles it to Cedar.
→ Next: How Tyr compares · Quick start