Over-sandboxed agents
Agents can read docs and write code but cannot touch the live systems where incidents and operational tasks happen.
Secure Agent Containment
Cove is an on-prem control plane that isolates agents inside ephemeral microVMs and routes every outbound connection through enforceable policy.
Govern database access, API calls, object storage operations, and privileged scripts with protocol-aware controls and full semantic logging.
Deploy Cove where your sensitive systems already live.
The Problem
Teams either sandbox agents so tightly they cannot do real work, or hand over live credentials without enforceable boundaries or meaningful visibility.
Agents can read docs and write code but cannot touch the live systems where incidents and operational tasks happen.
Granting raw SSH keys, database passwords, or API tokens creates unnecessary blast radius when an agent overreaches.
Traditional logs show connections, not intent, making it hard to answer what the agent actually queried, called, or modified.
How Cove works
Cove runs each agent inside an ephemeral Linux microVM and intercepts outbound TCP so every action is evaluated against policy before it reaches your systems.
Every run starts in a fresh Linux microVM with scoped permissions and no standing privileged network path.
iptables redirects outbound TCP through Cove proxies automatically, so agents use normal tools without custom network config.
Policies are evaluated at the application layer for SQL queries, API methods, object operations, and elevated scripts.
Capture semantic events and connection telemetry so security teams can monitor live sessions and investigate historical activity.
Protocol-aware policy layer
Cove does more than allow or deny sockets. It enforces what the agent can do once connected.
Containment
Run every agent session inside a short-lived Linux microVM with tightly scoped permissions.
Network Control
Redirect all outbound TCP from the VM through Cove at the kernel level with no agent-side reconfiguration.
Policy Enforcement
Parse and enforce policies for Postgres, MySQL, S3, internal APIs, and approved script execution.
Auditability
Log what happened at the application layer: SQL statements, API calls, object keys, and escalation events.
Visibility
Monitor live sessions, active connections, and traffic flow from a web dashboard built for security review.
Deployment
Ship Cove as a single Go binary with PostgreSQL persistence on your cloud, VPC, or hardware.
Bring Your Own Agent
MCP-compatible agents can call request_permission to ask for narrowly scoped, time-limited elevated access.
Claude Code, Codex, custom agents, and shell scripts still run under the same interception path, policy engine, and proxy layer.
Swap agents by task, isolate each run in its own microVM, and govern all outbound behavior with one consistent policy model.
Architecture at a glance
A consistent path from agent execution to policy decision to audit record.
MicroVM
Ephemeral Linux environment for each agent session.
Interception
Kernel-level redirect of outbound TCP through Cove.
Proxies
Protocol-specific enforcement for DB, S3, APIs, and scripts.
Audit Log
Queryable semantic history with optional payload capture.
Audit, approvals, and oversight
Cove records both transport-level and application-level events so security teams can review activity in real time or during incident response.
Track source, destination, timestamps, bytes transferred, and optional full request/response capture.
Record SQL statements, API methods and paths, object keys, and permission escalation outcomes.
Watch active sessions and traffic flow as agents operate across your environment.
Route high-risk escalation requests to Slack, Teams, or email and log every approval or denial decision.
Deployment
Deploy Cove as a single Go binary with an embedded React dashboard. No container platform is required.
Use PostgreSQL for policy and session storage, then connect Linux hosts or ephemeral VMs through SSH or Sprites.dev.
Agent traffic, database queries, and audit records remain in your environment while Cove cross-compiles the agent component for x86_64 and ARM.
FAQ
No. Cove intercepts outbound TCP at the kernel level in the microVM, so agents can keep using standard tools, SDKs, and libraries.
Cove enforces protocol-aware policies, including read-only database rules, endpoint and method allowlists for APIs, scoped S3 access, and controlled script execution.
When an agent hits a policy boundary, Cove can route an approval request to Slack, Microsoft Teams, or email. Reviewers can approve or deny with context, and every decision is logged.
Cove deploys as a single Go binary with an embedded dashboard and PostgreSQL persistence on infrastructure you control. Agent traffic and data stay inside your environment.
Ready to evaluate Cove?
Get a walkthrough tailored to your environment, policy model, and live operational workflows.