Get Started
Real-time threat protection for AI agents and MCP endpoints
Deploy real-time protection for your AI agents and MCP servers. Akto Guardrails blocks threats as they occur, preventing prompt injections, tool abuse, and unauthorized access before they impact your systems.
Quick Start
Step 1: Sign Up or Log In
Go to app.akto.io
Sign up for a new account or log in to your existing account
Step 2: Navigate to Connectors
Go to Quick Start in your Akto dashboard
Scroll to the Guardrails section
Choose the proxy type that matches your setup
Step 3: Configure Your Proxy
Select and configure the appropriate protection proxy:
For MCP Servers
Deploy real-time protection for Model Context Protocol servers, tools, and resources.
What it protects:
MCP tool invocations
Resource access patterns
Prompt handling
Schema compliance
For AI Agents
Deploy real-time protection for AI agents and LLM applications.
What it protects:
Agent requests and responses
Tool permission enforcement
Authentication patterns
Data leakage prevention
Step 4: Enable Protection
Once your proxy is configured:
Set environment variable:
AKTO_THREAT_ENABLED=trueStart routing traffic through the proxy
Monitor threats in Guardrails dashboard
Configure custom policies as needed
Step 5: Monitor & Respond
From your Guardrails dashboard:
View real-time threat detection
See blocked attacks and patterns
Configure blocking rules
Set up alerts for critical threats
What Gets Protected
Akto Guardrails defends against:
Prompt injection attacks
Tool abuse and permission escalation
Unauthorized access attempts
Schema violations
Suspicious data patterns
Known attack signatures
Key Features
Real-Time Threat Detection: Identify and respond to agentic security threats as they occur
OWASP Core Rule Set Support: Detect common attack patterns including XSS and SQL injection in agent interactions
Prompt Injection Protection: Block malicious prompts attempting to manipulate agent behavior
Tool Permission Enforcement: Prevent unauthorized tool access and permission escalation
Schema Conformance: Ensure agent requests comply with expected MCP schemas
Geofencing: Restrict agent component access based on geographic locations
IP-Based Blocking: Block or allow traffic from specific IP addresses or CIDR ranges
Next Steps
Discover your agents to get full visibility
Run security tests to identify vulnerabilities
Configure custom blocking policies for your use case
Need help? Contact [email protected] or use in-app Intercom.
Last updated