Skip to main content

Open-core multi-LLM communication monitoring, hallucination detection & deciphering for agent systems

Project description

InsAIts — Runtime Security for Multi-Agent AI

See what your agents say to each other. Stop the bad stuff before it ships.

PyPI version PyPI downloads Python 3.8+ License: Apache 2.0 Tests 100% Local OWASP MCP + Agentic AI 14-day trial

10,000+ installs from PyPI. Integrated into the AgentShield runtime — a community fork of Anthropic's Claude Code ecosystem with 35k+ stars.

InsAIts live dashboard
Live threat dashboard — session score, anomaly feed, agent intelligence, OWASP alignment. Visit the website →

Latest demoDashboard walkthroughPrototype


The problem

AI-to-AI communication is a blind spot. Microsoft, CrowdStrike and Cisco can see that an agent exists — they cannot see inside a spawn chain. When an agent spawns a subagent that spawns another subagent, the behavior of those deeper agents is invisible to every enterprise monitoring tool on the market today.

Meanwhile, agent-to-agent interactions fail silently. Hallucinations propagate as "facts." Agents invent citations. Sensitive data leaks into tool chains. Meaning drifts across messages. Tool descriptions change between discovery and invocation. The agents nobody watches are the agents that cause the most damage.

InsAIts makes this visible and acts on it.


What it does

A runtime security layer that plugs into your agent stack. It observes every message and every tool call, detects a wide class of multi-agent failures and attacks, and can actively intervene — blocking, quarantining, rerouting, or escalating to a human operator.

  • Full spawn-tree visibility — every agent, every subagent, every tool call. Attribution down to the exact caller. No blind spots.
  • Broad runtime coverage — aligned with the OWASP MCP Top 10 and Agentic AI Top 10. Catches credential exposure, prompt injection, tool manipulation, data exfiltration, rogue behaviour, hallucination chains, covert channels, and more.
  • Active protection, not just alerting — critical anomalies can be quarantined, rerouted, or escalated to a human. Configurable per severity.
  • 100% local by default — your agent traffic never leaves the box. No cloud round-trips. Audit logs store hashes, not raw content. GDPR-ready.
  • Tamper-evident audit trail — hash-chained so any modification is detectable. Export-ready for compliance review.
  • Live dashboard — real-time threat score, agent intelligence, anomaly stream, circuit-breaker grid, OWASP coverage.
  • Drop-in integrations — LangChain, CrewAI, LangGraph, AutoGen/ag2, and direct Claude Code / Cursor / Windsurf / Codex / Aider hook support.

Install

pip install insa-its[full]

Quick start

# Terminal 1 — event hub
insaits-collector

# Terminal 2 — live dashboard
insaits-dashboard

# Open http://localhost:5001

Three lines to integrate in Python:

from insa_its import insAItsMonitor

monitor = insAItsMonitor()
result = monitor.send_message(
    text=agent_response,
    sender_id="OrderBot",
    receiver_id="InventoryBot",
    llm_id="gpt-4o",
)
# Act on the result — see the user guide for the full API.

That's the whole public surface you need to start. The rest of the behaviour is configured through the dashboard or .insaits_config.json — no code changes required.

Claude Code integration

One hook entry in .claude/settings.json gives you pre-execution gating, full tool-call audit, spawn-tree attribution, and session continuity across compaction. See the user guide for the exact snippet.

Session-length multiplier. InsAIts captures a lightweight session vault after each tool call. After context compaction, the next session resumes from a sub-kilobyte brief instead of re-reading thousands of tokens of history. Users report Claude Code Opus sessions going from ~40 min to 3h+ on the same Pro plan.

Minimal install (no local embeddings):

pip install insa-its

Pricing

All detection features are available under open-core (Apache 2.0). You pay for productivity, longer sessions, premium detectors, and team features.

Tier Monthly Lifetime What you get
Trial free 14 days Full feature access. No card required.
Starter €10 €99 Full detection + reliability gates + session vault + dashboard.
Pro €49 €299 Starter + advanced context engineering, inter-session dialog, forensic export, Decipher engine, priority support.
Enterprise from €200 custom SOC2-ready audit export, multi-seat, white-label dashboard, dedicated support.

Activate

Pick a link. Your license key arrives by email after checkout.

Install:

export INSAITS_LICENSE_KEY="insaits_live_..."
insaits-collector

Enterprise and custom: info@yuyai.pro.

Passive mode

When the trial lapses and no key is set, detection still runs and anomalies still surface on the dashboard. What unlocks with a paid key is active intervention — the corrective signals the layer sends back to your agents. You always see everything InsAIts catches.


Coverage

InsAIts covers both the OWASP MCP Top 10 and the OWASP Agentic AI Top 10. Threat types are grouped into:

  • Security — credential leakage, prompt injection, tool poisoning, data exfiltration, unauthorised access, covert channels, shadow servers.
  • Hallucination & grounding — cross-agent contradictions, phantom citations, ungrounded claims, confidence decay.
  • Semantic & communication — meaning drift, emergent shorthand, context loss, inter-agent jargon.
  • Behavioural — rogue deviation from baseline, probing patterns, rapid tool-call anomalies, loop detection.
  • Reliability — premature completion claims, unverified assertions, file-reference hallucinations, escalation on repeated failures.

Detection is implemented across many adapters and detectors — the exact set is under open-core and can be toggled per deployment. The premium tier adds semantic divergence scoring, advanced rogue-subagent tracking, and the compliance export engine.


Live dashboard

The web dashboard renders in real time on http://localhost:5001:

  • Session threat score with stage label (safe → watch → alert → isolate)
  • Live anomaly stream with severity colour coding
  • Per-agent intelligence and trust scores
  • Circuit-breaker grid for blocked agents
  • OWASP alignment panel
  • Tool-call inspector with full spawn-tree drill-down
  • Token-usage panel with cost estimates

A companion terminal dashboard is available for VS Code split-panes:

pip install insa-its[dashboard]
insaits-tui

Audit & compliance

  • Hash-chained audit log — SHA-256 per entry, verifiable integrity.
  • Prometheus metrics endpoint for existing monitoring stacks.
  • Forensic export of rogue agent behaviour — timeline, intent, threat score.
  • SOC2-ready evidence chain (Pro / Enterprise).
  • 100% local processing. Audit logs store hashes, never raw content. API keys are hashed before storage. GDPR-aligned by default.

Integrations

LangChain • CrewAI • LangGraph • AutoGen / ag2 • Claude Code • Cursor • Windsurf • Codex CLI • Aider • Continue.dev • Kiro • Slack notifier • Notion export • Airtable export • Prometheus metrics.

Wire-up for each integration is documented in the user guide. A typical integration is a one-liner wrap on your chain / crew / graph object.


Architecture (high-level)

Your multi-agent system
        │
        ▼
┌─────────────────────────┐
│   InsAIts runtime layer │    ← detection, intervention, circuit-breakers
└─────────────────────────┘
        │
        ├── local event hub (port 5003)
        ├── live dashboard  (port 5001)
        └── tamper-evident audit log (local disk)

Everything runs on your machine. No message content leaves the box.


Use cases

Industry What InsAIts catches
E-commerce Order bots losing context mid-transaction
Customer service Agents developing incomprehensible shorthand
Finance Analysis pipelines hallucinating metrics between agents
Healthcare Multi-agent decisions where errors have consequences
Research Fabricated citations, phantom papers
Legal AI-generated documents with ungrounded references
Security Red-team AI exercises, exfiltration attempts, compliance
DevOps Claude Code / Copilot tool calls in CI/CD pipelines

What's new

Each release focuses on a specific reliability or cost axis. The most recent work targeted token efficiency under long multi-agent runs — corrective signals are now more surgical, which reduces Claude-context overhead during continuous monitoring without sacrificing coverage. Full notes on the GitHub releases page.


Documentation & support


License

Open-core model.

  • Core SDK (Apache License 2.0) — free to use, modify and distribute.
  • Premium features (shipped with pip install insa-its) — proprietary, gated by license key.

InsAIts — Making multi-agent AI trustworthy, auditable and secure.
OWASP MCP + Agentic AI Top 10 coverage • Full spawn-tree visibility • Tamper-evident audit • 100% local • 1900+ tests passing.

Starter from €10/month · Pro from €49/month · Enterprise custom
Contact: info@yuyai.pro

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

insa_its-4.8.7.tar.gz (535.7 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

insa_its-4.8.7-py3-none-any.whl (605.5 kB view details)

Uploaded Python 3

File details

Details for the file insa_its-4.8.7.tar.gz.

File metadata

  • Download URL: insa_its-4.8.7.tar.gz
  • Upload date:
  • Size: 535.7 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.1

File hashes

Hashes for insa_its-4.8.7.tar.gz
Algorithm Hash digest
SHA256 69d5553c7e7bf41b6ed04d91c57df1f93cf5040a47b25c2014ae83df8e29b33c
MD5 2e974bd613f776259a6486be06d51388
BLAKE2b-256 b11c10d5b1245cceeb12e8bcf9bf8860aaaed575eddfc3819e6d4f91776998bb

See more details on using hashes here.

File details

Details for the file insa_its-4.8.7-py3-none-any.whl.

File metadata

  • Download URL: insa_its-4.8.7-py3-none-any.whl
  • Upload date:
  • Size: 605.5 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.1

File hashes

Hashes for insa_its-4.8.7-py3-none-any.whl
Algorithm Hash digest
SHA256 8a56bc777889d82aa877d7a4b36e8d1726332fd439d5a53a607b2077fe1b926a
MD5 965b26071b1213b22aef9f0551beb6ba
BLAKE2b-256 7ad48c227361ee62a0119d4d90b0377a654e3fd9d73871a54f044fcd24273c9d

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page