NewAgent Runtime Security + Observability

AI Agent Monitoring

At the Kernel Layer

Traditional instrumentation misses what agents do in subprocesses and tools. Metoro uses eBPF to capture every request, action, and anomaly - with no code changes.

Get started free

Free trial available · No code instrumentation required

kernel syscall capture
AI Agent Process
python / ruby / node
Program Execution
shell / curl / browser
libc Wrapper
network / io calls
Socket Syscall
kernel boundary
eBPF Probe
capture at source
capture
Metoro Pipeline
normalized telemetry
Trusted by hundreds of the best at
Nuco Cloud logo
Kong logo
Aposyro logo
Porter
Odos logo
Asteroid.ai logo
Fern Labs logo
Remy Security
Mozilla logo
Kong logo
Koton logo
Porter
Rappi logo
Asteroid.ai logo
Infotrax logo
Remy Security
DocioHealth
Kong logo
Freedx logo
Porter
The Problem

Monitoring AI Agents Is
a New Runtime Problem.

// instrumented app
user → api
→ otel-sdk → dashboard
// ai agent
agent → python → bash → curl
→ ??? no telemetry hook
Instrumentation gap

No Instrumentation Point

Traditional apps emit telemetry from known code paths. AI agents call arbitrary programs and tools - there is no reliable hook to attach to.

Dynamic dependencies

Unknown Call Paths

Agents access external systems dynamically. Dependencies and call patterns are broad and non-deterministic, impossible to model ahead of time.

malicious agent detected
THREAT DETECTED
target: usa.gov
pattern: ddos burst
egress: 2,400 req/s
→ user submits agent package
→ executes on company infra
→ calls external services
Execution risk

Arbitrary Execution Risk

Autonomous agents run untrusted code that affects security, availability, and external systems - on your infrastructure, in real time.

The Solution

Observe Once
At the Kernel.

eBPF instrumentation at the kernel layer captures what every agent process is doing - regardless of language, framework, or toolchain. Instead of chasing instrumentation across scripts, you monitor the common syscall boundary.

  • One capture point covers all agent runtimes
  • No SDK hooks, no sidecars, no code changes
  • Works with Python, Ruby, Node, Bash, curl - anything
  • Every outbound call passes the kernel - nothing escapes
Get started
ebpf capture path
// any agent runtime
agentpythonbashnoderubycurl
↓ all paths converge
CAPTURE
kernel syscall boundary
socket() · connect() · write() · read()
eBPF probe attached ↗
↓ normalized telemetry
traces
12.4k events/s
llm calls
847 captured
egress
1,204 hosts
threats
0 detected
Capabilities

What You Can Do With
AI Agent Monitoring.

// provider-agnostic capture
python-agentprovider: openai
prompt: Summarize incident timeline
response: Root cause: DNS timeout in...
ruby-agentprovider: gemini
prompt: Classify log severity
response: ERROR - latency spike at 14:32

Built-In LLM Query Inspection

Capture prompts and responses for every AI agent request across languages and frameworks - no SDK hooks required.

14:32:01spawn/bin/bash -lc
14:32:02networkPOST api.openai.com
14:32:04resourcecpu +72%
14:32:05llmstatus=200 tokens=1204
14:32:07networkGET internal-api/data

Audit Log for All Agent Actions

Track process creation, outbound requests, resource spikes, and model calls in one immutable sequence for accurate incident replay.

// any runtime → any destination
python scriptapi.stripe.com200
curl clihooks.slack.com200
headless browserunknown-host.xyz403

External Request Visibility

See every outbound request made by scripts, CLIs, and browser automation in one consistent stream.

// request rate over time
ANOMALY
burst: 1,200 req/s at 14:32:08

Automatic Malicious Activity Detection

Out-of-box and custom detections identify abnormal request bursts, policy violations, and high-risk command patterns.

// automated response playbook
Block Request
drop malicious egress
Alert Team
notify on-call + slack
Kill Agent
terminate pod

Built-In Reactions to Threats

Respond immediately by blocking requests, notifying your team, or terminating agent execution the moment malicious activity is confirmed.

<5m
install time
0
code changes
1000s
nodes in production
Customer feedback

What teams are saying.

FAQ

Frequently Asked Questions

Everything about AI Agent Monitoring.

What is AI agent monitoring?
AI agent monitoring is runtime visibility for autonomous agents: what prompts they receive, which tools they call, which network requests they make, what files or subprocesses they touch, and whether their behavior changes in risky ways. Metoro captures that activity from the operating system layer so teams can audit agents without adding SDK code to every framework.
How is AI agent monitoring different from LLM observability?
LLM observability usually focuses on model calls, prompts, completions, latency, tokens, and cost. AI agent monitoring also covers the agent runtime around the model: tool use, shell commands, outbound API calls, database access, Kubernetes activity, and subprocess behavior that traditional LLM tracing can miss.
Why use eBPF for AI agent monitoring?
eBPF lets Metoro observe agent behavior from the kernel without changing application code. That matters for AI agents because important actions often happen outside the model call, such as a spawned process, HTTP request, package install, or tool invocation. Kernel-level monitoring gives a consistent audit trail across languages and agent frameworks.
Can Metoro monitor AI agents running on Kubernetes?
Yes. Metoro is built for Kubernetes environments and can monitor AI agents running in pods, jobs, services, and worker processes. It correlates runtime behavior with Kubernetes metadata so teams can see which workload, namespace, service, or deployment produced a risky action.
Which AI agent frameworks does Metoro support?
Because Metoro observes runtime behavior with eBPF, it is not tied to one agent framework. It can monitor agents built with common Python, Node.js, and other runtimes, including agents that use LangChain, LlamaIndex, custom tool loops, browser automation, shell tools, or internal orchestration code.
Does AI agent monitoring require code changes?
No. Metoro does not require agent SDK instrumentation to capture runtime activity. You install Metoro in the Kubernetes environment, and it observes requests, process activity, and telemetry from the infrastructure layer.
Can Metoro detect risky or malicious AI agent behavior?
Metoro can surface suspicious runtime behavior such as unexpected outbound requests, unusual tool use, anomalous subprocess activity, and changes in traffic patterns. It gives security and platform teams the evidence they need to investigate agent behavior quickly.
How does Metoro help with AI agent audit logs?
Metoro creates an operational audit trail for agent activity by capturing runtime events and connecting them to services, pods, requests, and external dependencies. This helps teams answer what an agent did, when it happened, and which infrastructure was involved.
What scale of traffic does Metoro support?
Metoro is running in production on clusters with thousands of nodes and billions of requests per day.
Does Metoro run on-premises?
Yes. Metoro can be deployed on-premises or in any cloud provider. As long as Kubernetes is available, Metoro can be deployed.
What levels of the network stack does Metoro observe?
Metoro primarily observes L4 and L7 protocols, including HTTP, HTTPS, gRPC, and more. For AI agent monitoring, that means teams can see the agent runtime activity around model calls, APIs, services, and external tools.
Can Metoro monitor agent tools and external API calls?
Yes. Metoro can capture outbound requests and correlate them with the workload that made them. This is useful for monitoring agents that call internal APIs, third-party services, vector databases, browser tools, code execution tools, or other external systems.
Does Metoro offer pilots?
Yes - a free 30-day pilot with support from a dedicated engineer is generally available for evaluation.
How much does Metoro cost?
There is a free tier for hobbyists. Cloud pricing starts at $20/node/month. On-premises is priced based on support level.

Full agent visibility.
Deploy in minutes.

See how Metoro tracks agent behavior end-to-end on your Kubernetes clusters. No code changes, no sidecars.

Get started free
Free trialNo credit card< 5 min setup