We used to protect people.
Now we protect agents.
The open detection standard for AI agent security.
108 rules. Shipped in Cisco.
Protecting 90,000+ skills across the ecosystem.
the largest AI agent security scan ever conducted
946 flagged with threats
Every AI agent calls external tools.
The ecosystem needs a shared detection standard.
Attackers trick AI agents into leaking credentials, running malicious commands, and bypassing safety boundaries.
Without shared rules, every platform fights the same threats alone.
ATR gives the entire ecosystem a shared defense.
One set of rules,
shared across the ecosystem.
Every rule you use
strengthens everyone's defense.
9 threat categories.
108 rules. Real CVEs.
Hijacking agent behavior through crafted inputs
Poisoned tool descriptions and malicious tool responses
Malicious or vulnerable MCP skills and SKILL.md
Stealing conversation context and sensitive data
Social engineering and behavioral manipulation of agents
Unauthorized elevation of agent capabilities
Agents exceeding intended operational boundaries
Corrupting training data or knowledge sources
model-abuse
and reveal the system prompt"
Cisco AI Defense
ships 34 ATR rules
as upstream.
Their engineer submitted a PR. We reviewed it. Merged in 3 days. 1,272 additions. Then they built a CLI specifically to consume ATR rules. Your platform can do the same.
34 rules as upstream
Every endpoint is a sensor.
Every scan strengthens the network.
Your scan results feed back into the Threat Cloud. AI analyzes new threats, crystallizes detection rules, and the community reviews them.
The more you use ATR, the safer the entire ecosystem becomes.
This is not a tool. It is a network effect.
Endpoints report suspicious patterns via ATR Reporter
Join the ecosystem.
Cisco walked this path. Awesome LM-SSP did.
Agentic AI Top 10 did.
Connect your platform to ATR and join the shared defense network.