# Custom Probe

Security requirements for agentic systems are often unique to your business context and agent architecture. Akto enables you to write and automate custom security probes tailored to your specific AI agents and MCP implementations.

You can write probes in YAML to scan various aspects of your agent components, including prompt handling, tool permission boundaries, data leakage patterns, MCP endpoint security, and agentic-specific vulnerabilities. Custom probes are especially useful for scanning unique agent behaviors, complex tool chains, or proprietary LLM integrations that may not be covered by predefined probes.

The Probe Library in Akto includes over 1000 built-in probes for agentic security, a YAML-based editor for creating custom probes, and features to scan probes on sample agent components. This streamlines the AI Red Teaming process for autonomous systems.

For more information on creating custom probes, please refer to this documentation- [Create a Custom Probe](/akto-argus-agentic-ai-security-for-homegrown-ai/probe-library/how-to/create-a-custom-test.md).


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://ai-security-docs.akto.io/akto-argus-agentic-ai-security-for-homegrown-ai/probe-library/concepts/custom-test.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
