CLI launcher for Cylestio Perimeter with default OpenAI and Anthropic configs
Project description
Agent Inspector
Analyze and debug AI agents in real-time. Scan your code for vulnerabilities (both statically and dynamically), trace LLM calls, and evaluate runtime behavior—all from a single command.
Install through the IDE
IDE integration provides MCP query tools for inspecting sessions, risk metrics, and security findings directly in your editor. It also enables static analysis to scan your agent code for vulnerabilities before runtime.
Claude Code
Run these commands to register the marketplace and install the plugin:
/plugin marketplace add cylestio/agent-inspector
/plugin install agent-inspector@cylestio
/agent-inspector:setup
After installation, restart Claude Code for the MCP connection to activate.
Cursor
Copy this command to Cursor and it will set everything up for you:
Fetch and follow instructions from https://raw.githubusercontent.com/cylestio/agent-inspector/main/integrations/AGENT_INSPECTOR_SETUP.md
After setup, restart Cursor and approve the MCP server when prompted.
Install without IDE Integration
Run directly with uvx:
uvx agent-inspector openai # or: anthropic
Install via pipx or pip:
pipx install agent-inspector
agent-inspector openai # or: anthropic
This starts:
- A proxy server on port 4000 (configurable)
- A live trace dashboard on port 7100 (configurable)
CLI Options
| Flag | Description |
|---|---|
--port, -p |
Override the proxy server port (default: 4000) |
--ui-port |
Override the dashboard port (default: 7100) |
--base-url |
Override the LLM provider base URL |
--use-local-storage |
Enable persistent SQLite storage for traces |
--local-storage-path |
Custom database path (requires --use-local-storage) |
--log-level |
Set logging level (DEBUG, INFO, WARNING, ERROR, CRITICAL) |
--no-presidio |
Disable Presidio PII detection (enabled by default) |
Point your agent to the proxy:
# OpenAI
client = OpenAI(base_url=f"http://localhost:4000/agent-workflow/{AGENT_WORKFLOW_ID}")
# Anthropic
client = Anthropic(base_url=f"http://localhost:4000/agent-workflow/{AGENT_WORKFLOW_ID}")
Replace AGENT_WORKFLOW_ID with your project identifier (e.g., derived from your git repo name, package name, or folder name).
Open http://localhost:7100 to view the live dashboard.
Identifying and Grouping LLM Calls
The proxy automatically detects and groups most identifiers. All headers below are optional and only needed when you want to override the automatic behavior. Add headers via your SDK's extra_headers or default_headers parameter.
Workflow ID (required in URL)
An agentic workflow composed of multiple LLM calls with different prompts should be identified using the workflow ID in the base URL:
http://localhost:4000/agent-workflow/{AGENT_WORKFLOW_ID}
This groups all calls from the same agent or application together, regardless of prompt type or conversation.
Session Grouping (optional)
When an agent executes a series of different LLM conversations as part of a single run or task, you can group them into one session:
x-cylestio-session-id: request-f1a1b2a8
This is useful for multi-step workflows where a classifier, retriever, and generator each make separate calls but belong to the same execution. No automatic detection - must be provided explicitly.
Conversation Type (auto-detected)
The proxy automatically identifies different conversation types based on the system prompt hash. Each unique system prompt creates a distinct conversation type in the dashboard.
To assign a meaningful name instead of an auto-generated hash, optionally use:
x-cylestio-prompt-id: tool-decision-making
Conversation ID (auto-detected)
Multi-turn conversations with message history are automatically inferred from the prompt content and conversation structure.
To explicitly track a conversation across API calls, optionally generate your own identifier:
x-cylestio-conversation-id: conv-uuid-here
Custom Tags (optional)
Attach arbitrary metadata to any LLM call for filtering and analysis. Use comma-separated key:value pairs:
x-cylestio-tags: user:alice@example.com,env:production,team:backend
Tags appear in the dashboard and can be used to filter sessions by user, environment, feature flag, or any custom dimension.
Features
Security Scanning & Fixes
- Scan your agent code for OWASP LLM Top 10 vulnerabilities
- Get AI-powered, context-aware fixes for security issues
- Track remediation progress with recommendation lifecycle
- Check production deployment readiness with gate status
Live Tracing & Debugging
- Stream live traces of sessions, tool executions, and messages
- Real-time token usage and duration tracking
- Debug agent sessions with full event replay and timeline
- Health badges and status indicators
Risk Analytics
Evaluate agent risk across four categories:
- Resource Management: Token usage, session duration, and tool call patterns
- Environment & Supply Chain: Model versions and tool adoption
- Behavioral Stability: Consistency and predictability scoring
- Privacy & PII: Automated detection of sensitive data exposure
PII Detection (Microsoft Presidio)
- Scan prompts, messages, and tool inputs for sensitive data
- Confidence scoring on each finding
- Session-level and aggregate reporting
Dynamic Runtime Analysis
- Analyze runtime behavior and detect anomalies
- Cross-reference static findings with runtime evidence
- Identify validated issues vs theoretical risks
- Track behavioral patterns and outliers
Compliance & Reporting
- Generate compliance reports for stakeholders (CISO, executive, customer DD)
- OWASP LLM Top 10 coverage tracking
- SOC2 compliance mapping
- Audit trail for all security fixes
Dependencies
Agent Inspector is built on:
- cylestio-perimeter - Agent monitoring infrastructure
- Microsoft Presidio - PII detection and analysis
License
Apache License - see LICENSE for details
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file agent_inspector-1.2.1.tar.gz.
File metadata
- Download URL: agent_inspector-1.2.1.tar.gz
- Upload date:
- Size: 48.0 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
6899a173981788d7994fab777ced622fe03978d23f19cac101ab74b58d317dd5
|
|
| MD5 |
622fa964fde0892617fee8849a24bfd9
|
|
| BLAKE2b-256 |
1ceb10dfdafdac1672e58bad34b1a36fe757db539686e3c533f02165785ebe8e
|
Provenance
The following attestation bundles were made for agent_inspector-1.2.1.tar.gz:
Publisher:
publish.yml on cylestio/agent-inspector
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
agent_inspector-1.2.1.tar.gz -
Subject digest:
6899a173981788d7994fab777ced622fe03978d23f19cac101ab74b58d317dd5 - Sigstore transparency entry: 828624616
- Sigstore integration time:
-
Permalink:
cylestio/agent-inspector@5478fa35f31412ce9cf75609529d5f6acbf1b557 -
Branch / Tag:
refs/tags/v1.2.1 - Owner: https://github.com/cylestio
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@5478fa35f31412ce9cf75609529d5f6acbf1b557 -
Trigger Event:
release
-
Statement type:
File details
Details for the file agent_inspector-1.2.1-py3-none-any.whl.
File metadata
- Download URL: agent_inspector-1.2.1-py3-none-any.whl
- Upload date:
- Size: 11.9 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
7d86282a38bff1d98ef18829c9ca90191a730d6edb22d8c704480fbdc56d88a5
|
|
| MD5 |
73e5dd80f2e7eaa95cb82bfb23aebc20
|
|
| BLAKE2b-256 |
4efc3faefe11996ab96fb90b659b9cf6843348db785915ab1f1718e5d13050eb
|
Provenance
The following attestation bundles were made for agent_inspector-1.2.1-py3-none-any.whl:
Publisher:
publish.yml on cylestio/agent-inspector
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
agent_inspector-1.2.1-py3-none-any.whl -
Subject digest:
7d86282a38bff1d98ef18829c9ca90191a730d6edb22d8c704480fbdc56d88a5 - Sigstore transparency entry: 828624655
- Sigstore integration time:
-
Permalink:
cylestio/agent-inspector@5478fa35f31412ce9cf75609529d5f6acbf1b557 -
Branch / Tag:
refs/tags/v1.2.1 - Owner: https://github.com/cylestio
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@5478fa35f31412ce9cf75609529d5f6acbf1b557 -
Trigger Event:
release
-
Statement type: