See what Cursor, Claude Code, Codex, Gemini, and Copilot are doing across your team. AgentChute blocks risky actions before they run and keeps the audit trail when something needs review.
See which AI coding tool acted, what it tried, and which rule fired across the whole team.
Stop risky installs, shell commands, file edits, leaked secrets, and policy violations before they run.
Record allowed actions, blocked actions, access changes, and exportable evidence for later review.
One real repo · One AI coding tool · First event reviewed together
Built on top of AgentLint OSS — the open-source linter we maintain for the same problem. AgentLint catches risky behavior locally. AgentChute turns those signals into a team-wide action trail.
Compatibility
+ any MCP-compatible host
AgentLint includes hybrid rules that can consult curated security feeds such as GHSA, OSSF, gitleaks, URLhaus, and StevenBlack. Below is the actual rule output for a real npm install command.
Output above is real. The advisory GHSA-vqx2-fgx2-5wq9 is publicly searchable. The rule logic is open-source on GitHub; the curated security-feed data is the cloud half — data is the moat.
Section I · Why this exists
They install packages, edit files, run shell commands, call tools, and touch production paths. The risk is no longer only what the model wrote — it is what the agent is about to do.
Cursor, Claude Code, Codex, Gemini, and Copilot each create their own trail. Engineering leaders need one place to see risky AI actions across the team.
CodeRabbit reviews after a PR exists. SAST usually runs after commit. AgentChute sits earlier, inside the AI coding session, before the action runs.
Action surface · What AgentChute watches
AgentChute is built for the moment before an AI coding agent changes your system: the install, the command, the edit, the secret, the suppression.
Vulnerable versions, compromised packages, and supply-chain indicators before the install command runs.
Destructive, privileged, or infrastructure-touching commands while the agent is still asking to execute.
Risky writes, suspicious patterns, and policy violations as code changes happen in the editor.
Leaked keys, private-key material, token-like strings, and unsafe credential handling before they spread.
Ignore comments, noisy rules, and team-level patterns that tell you where guardrails need tuning.
Section II · Operator console
Real-time violations, rule effectiveness, per-tool breakdowns, blocked actions, audit export, and weekly summaries. The dashboard gives leaders one event trail instead of scattered local logs.
Sample console · Beta dashboard
Team control · Supporting infrastructure
Owners can issue separate keys for CI, developers, contractors, and pilots, then revoke access without rotating the whole organization. Every decision stays attached to the team event history.
Use different access paths for CI, developers, contractors, and pilots instead of one shared team secret.
Start with one tool, one project, or one design partner team while keeping the rest of the org unchanged.
Revoke leaked, retired, or temporary access without rotating the whole organization.
Keep access changes attached to the same event history your team reviews later.
Why this matters
Access control is not the headline; it is what makes the action trail usable by a real team. You can pilot AgentChute narrowly, remove access cleanly, and still preserve the evidence.
Cited evidence · From public record
Every number below comes from a public report. We don't invent industry-average estimates — each one links to the source so you can verify it.
Cursor + Claude Opus 4.6 wipes PocketOS production database in 9 seconds
Security researcher earns $25K finding secrets in 'deleted' GitHub commits
Sha1-Hulud worm hits Postman, Zapier, PostHog via NPM
Section III · Maintainer credentials

I lead engineering at WAG, an AI-native platform running on AI-coding workflows end-to-end. Median cycle time went from 3 days to 1 day. That's when I learned the hard part isn't getting AI to ship code — it's seeing what your AI actually shipped. That's where AgentChute started.
Why I built this
When an agent can run gcloud, kubectl, terraform, or iptables, the blast radius isn't a bad commit — it's a production outage or a deleted database. We're building the tooling and intuition for autonomous agent safety in the open.
Founding Head of Engineering at Félix Pago (QED, General Catalyst, Monashees · $75M Series B), scaling cross-border payments from zero to $250M+/month volume and 1M+ customers.
Prior IC at Lyft and Nubank. 100+ engineers hired across orgs, 1,000+ engineering interviews. Master's in Blockchain. Bilingual EN/ES.
The open-source linter that runs on every developer's machine. AgentChute adds the org-wide action trail, blocked decisions, and event history on top.
Section IV · Deployment procedure
No SDK to integrate. No PR pipeline to rewrite. AgentLint hooks into the AI coding tools your team already uses.
Apply for the private beta. We review fit manually before opening access.
Works with Cursor, Claude Code, Codex, Gemini, MCP hosts, and AGENTS.md-compatible tools.
$ pip install agentlintSet AGENTCHUTE_LICENSE_KEY=ac_team_... in the AI coding environment. Events stream to your dashboard, and owners can revoke access when teams or environments change.
$ export AGENTCHUTE_LICENSE_KEY=ac_team_...Pricing · Simple by design
AgentLint OSS stays free forever. AgentChute is the paid team layer: shared visibility, controlled rollout, revocation, and audit history across AI coding tools.
Solo
No card · No expiry · No catch
AgentChute beta
Private beta is free while we onboard the first design partners. Paid team plans are expected to start at $249/mo per team after beta, including up to 10 developers and unlimited AI coding tools, for shared action history, controlled access, revocation, audit export, and weekly digest.
No pricing table yet
We are not forcing a checkout before the product proves value in real team workflows. Growth teams can add developers at $15/dev/mo before Enterprise; SSO, a DPA, custom retention, or private deployment become a security/procurement conversation. Email us with your team size and we'll scope the right beta path.
Compatibility · Integration matrix
AgentLint OSS ships native adapters for the main AI coding surfaces plus MCP and AGENTS.md-compatible workflows. AgentChute turns those local signals into one team event trail.
| № | Tool | Integration method | Status |
|---|---|---|---|
| 01 | Cursor | Native hooks (18 events) | Live |
| 02 | Claude Code | Native hooks (17 events) | Live |
| 03 | Gemini Code Assist | Native hooks (11 events) | Live |
| 04 | Codex / GitHub Copilot | Native hooks (6 events) | Live |
| 05 | MCP hosts | MCP server | Live |
Plus any AGENTS.md-compatible tool · Aider, OpenAI Agents SDK, and others
Routing · Where alerts go
We build integrations on customer pull, not roadmap promises. The universal webhook is the next integration layer; first-class Slack and PagerDuty follow when enough paying customers ask for them.
Outbound JSON POST for Slack bots, PagerDuty, Datadog, or your internal security workflow.
Native Slack app with per-channel rule routing and approval workflows.
Direct incident creation for ERROR-severity rules.
Streaming export of every event in OCSF format. Custom contract.
Want Slack first-class? Tell us — every request counts toward the 10-customer threshold.
Architecture · Two surfaces
AgentLint OSS protects every developer. AgentChute shows every leader. You need both.
Open source · For every dev
Catches secrets, force-pushes, broken tests, and dozens more on the developer's machine — before bad code is committed.
Forever · MIT-licensed
Hosted · For leaders
Everything in OSS, plus the org-wide visibility, policy, action history, controlled access, and audit-history foundation that a single-machine linter can't deliver.
Expected after beta · up to 10 devs
The OSS isn't crippled to push you toward AgentChute. It can't aggregate across machines because it runs on one machine. AgentChute is the layer that exists above it — different job, different product.
Comparison · AI coding stack
ChatGPT, Claude, Cursor, Copilot, CodeRabbit, and Greptile help teams create and review code. AgentChute is the team visibility and guardrail layer around that activity: what happened, which tool did it, which guardrail fired, and what needs review.
| AgentChute | Adjacent tools | Difference | |
|---|---|---|---|
| ChatGPT, Claude, Gemini | Records team-wide AI coding events and guardrail outcomes | Answer questions, generate code, explain systems | They create work. AgentChute shows what happened across the team. |
| Cursor, Copilot, Claude Code | Cursor + Claude Code + Copilot + Gemini | Run inside the editor or agent session | Each tool sees its own context. AgentChute aggregates the risk trail. |
| CodeRabbit, Greptile, Qodo | Catches risky agent behavior before or around commit time | Review pull requests and suggest fixes | Review tools inspect code after it exists. AgentChute watches the workflow. |
| Team budget | $249 / mo for up to 10 developers, unlimited tools | A 10-dev AI stack can run hundreds per month | One team-wide layer around tools the team already pays for. |
A 10-dev team can easily spend $800+/mo across Cursor, Claude, Copilot, and AI review tools. $249/mo AgentChute covers up to 10 developers and any mix of AI coding tools as the visibility and guardrail layer around the spend you already approved.
Eligibility · Who this is for
Reference · Frequently asked
Closing remarks
Apply for the private beta. We're onboarding selected teams manually: one repo, one AI coding tool, a 30-minute setup call, and no credit card.