BlueRock Unveils the Agentic Protection Platform

Dec 3, 2025

BlueRock is launching the Agentic Protection Platform—the first built-in runtime approach to see and secure agentic actions before they execute. As agents and MCP servers move into production with increasing autonomy, BlueRock delivers the missing foundation: visibility, trusted MCP intelligence, sandboxing, and pre-execution guardrails.

Harold Byun, CPO @ BlueRock‍

Today, we're unveiling the BlueRock Agentic Protection Platform—the first security platform purpose-built to see and secure agentic actions across tools, data access, and code execution before they run—for both agents and MCP Servers.  Unlike gateways that are bolt-on’s, Bluerock’s novel built-in approach is specifically designed for those building and deploying agents and MCP servers.


Agents and MCP servers are moving into production  at unprecedented scale, and driving towards increasing autonomy. The gap is that most observability and security controls continue to focus on prompt protection instead of addressing the new surface area:  actions that agents invoke. Bluerock addresses this gap head-on. If you're building agentic workflows, want to move fast and stay safe, this is for you.


The Agentic Imperative

Agentic workflows are no longer experimental. Over 20,000 new MCP servers are published monthly and approximately 85% of the Fortune 1000 are deploying agents in 2025. Businesses are demanding AI velocity and ROI through productivity gains, but security teams are playing catch-up.  


The gaps are structural, not tactical:


Developers need a safe place to build and run agents. Most builders recognize the need to build agents in an isolated sandbox environment and connect to safe MCP Servers. And while the implementation of these sandboxes contain the agent, they do not provide the observability and control over agent actions and command injection.  


MCP servers are the wild, wild west.  MCP Servers need to be trusted.  Developers need a safe place to execute their tools. Server implementations and security controls are all over the place.


These gaps compound because of how agents actually operate:


In a non-deterministic world, observing and securing  actions and code execution is paramount. Prompt level security and MCP gateways will continue to be bypassed. Anthropic's recent disclosure of an agentic-AI driven attack that easily evaded prompt guardrails demonstrates that an overreliance on prompt monitoring will not adequately secure agentic deployments.  

 

Agentic deployments require secure-by-default approaches as they become more autonomous. Agents are calling tools, accessing data, and executing code faster than humans can observe, let alone control.  Teams want agents that operate with increasing autonomy, call tools based on context, not explicit approval. Access data based on inferred need. Execute code to achieve goals without constant human review. This isn't an incremental shift in AI capabilities. It's a fundamental change in how systems operate.


The consequence is measurable:


Enterprise security requirements are now the #1 impediment to achieving business goals of agentic adoption, according to Anthropic's own research.  


The question isn't whether to adopt agentic systems. It's how to enable them safely in a developer-friendly way. This is where BlueRock comes in.


Actions Are the New Attack Surface

The first generation of agentic security focused on prompts. LLM gateways emerged to inspect requests, filter inputs, and detect malicious intent at the edge. This is a constant cyber arms race because it can always be circumvented via novel tactics.  In addition, prompt security methods lack visibility and control into agentic actions. 


MCP gateways see tool invocation but cannot see the execution boundary, and can be easily bypassed. Neither method sees the agent calling 47 different tools, accessing 12 database tables, and executing code across 3 different services to accomplish it.


For agentic security, that difference is everything.


This is the structural problem with modern agentic: the risk isn't what you ask agents to do. It's what they decide to do to accomplish it. Traditional security tools were built for human-in-the-loop prompt-driven workflows. Increasingly autonomous agents require a focus on actions.


This is the shift from Agentic Protection 1.0 to Agentic Protection 2.0.

Agentic Protection 1.0 (Prompt Inspection & MCP Gateways):
  • Inspect prompts and tool requests

  • High failure in prompt detection: adversaries rephrase until it works

  • Developers simply go around gateways circumventing the protection

  • MCP session structure makes gateways unreliable and unscalable


Agentic Protection 2.0 (BlueRock-inside):
  • See what agents actually do across tools, data, and execution

  • Invariant security controls at the moment of action, not the moment of request

  • Granular guardrails that protect the entirety of tool execution, both the invocation and the associated arguments


Gateways can be bypassed. BlueRock secures the agentic workload and actions..

Framework: The Three Agentic Boundaries

Not all agentic behavior is the same. Agentic operations cross three distinct execution boundaries, and every real incident maps to at least one:

1. Tools Boundary

Agents call MCP tools and custom integrations. They pass parameters, chain tool invocations, and expose capabilities you may not have audited.


What can go wrong:

  • Calling destructive tools (delete, modify, execute)

  • Passing unsafe parameters (SQL injection, path traversal)

  • Using shadow MCP servers with unknown provenance

2. Data Boundary

Agents access, read, transform, and move data. They pull from sources, push to sinks, and decide what's relevant, often with excessive permissions.


What can go wrong:

  • Reading sensitive data without context awareness

  • Exfiltrating data to unauthorized destinations

  • Accessing data across inappropriate boundaries (dev → prod)

3. Execution Boundary

Agents execute code: shell commands, subprocesses, file operations. This is where abstract "agent behavior" becomes concrete system-level risk.


What can go wrong:

  • Spawning shells in production containers

  • Executing unvalidated code from tool outputs

  • Privilege escalation via misconfigured permissions


Every agentic incident maps to one or more of these boundaries. BlueRock provides visibility and control across all three.


The BlueRock Agentic Protection Platform

Today, we're launching the BlueRock Agentic Protection Platform, purpose-built to see and secure agentic actions before they run. It's a unified stack with four core products:


Comprehensive Agentic Visibility

Unified action map across tools, data, and execution.


The Pain:
Visibility across agentic workflows is a black box. Traditional logs capture fragments. Organizations lack visibility into tool calls. Workload monitoring is disconnected from the agentic monitoring. The ability to understand the chain of events is missing. When something goes wrong, you're left piecing together partial telemetry with no clear view of the complete action chain.


What It Delivers:
Agentic Visibility builds a complete action map: every tool call and response, every session established, every data access, every execution, correlated across agents and MCP servers. You get agent and tool frequency analysis, attack alerts, prompt and tool poisoning detection, drift detection, and event replay for root cause and investigation, and OTEL-native export to your existing observability stack.


Real Impact:
Agents working in tandem with an MCP server layer generate an enormous volume of events. When an alert or adverse action is finally detected, it becomes a needle in a haystack exercise to diagnose what actually occurred when.  First and foremost, BlueRock uses invariant methods to block bad behavior and its agentic visibility tracks every session and interaction. This allows for a time-based view and sequencing of events to wade through the noise and isolate on what the root cause of behavior or an attack may be.


Who it's for: Platform engineers and security teams who need to understand what agents are actually doing at runtime.


→ Learn more about Agentic Visibility


MCP Trust Registry

Security ratings and risk intelligence for MCP servers and tools.


The Pain:
Before you connect an MCP server to your agent, you need to know: What tools does it expose? What vulnerabilities exist? Is the publisher reputable? Without a security-focused registry, teams are connecting servers blindly and hoping for the best.


What It Delivers:
The MCP Trust Registry evaluates MCP servers across over twenty categorized vulnerabilities and assigns risk ratings from Low to Critical. Each assessment includes publisher reputation verification, AI governance framework mappings, and CWE classifications with detailed code analysis. Teams get actionable remediation guidance and evidence-backed findings to decide what's safe to connect, what's risky, and what should never be deployed.


Real Impact:
The security problems associated with poorly implemented MCP servers have become fairly well known and they represent an inherent privilege escalation layer in agentic deployments.  It is critical for developers and security teams to understand the risks.  Understanding if you are connecting to a vendor published or “copycat” server becomes critical to ensuring the security of your agentic deployment.  Understanding whether a server allows for unbounded SSRF calls built into its code is important.  Understanding if there are hardcoded secrets is important to reducing the risk to your environment and ultimately your data.


Specific finding example: "We've scanned over 6,000 MCP servers and found 9.2% with critical vulnerabilities."


Who it's for: Developers and product teams building and publishing their own MCP servers or understanding the risks of connecting agents to MCP. Security teams evaluating which MCP servers are safe to deploy.


→ Explore the MCP Trust Registry


Agent Sandbox 2.0

Isolated agent sandbox protection with full action visibility and control.


The Pain:
Developers need a safe place to build and test agents without risking production systems. Traditional container isolation doesn't give you visibility into MCP protocol events or agent-specific behavior. Furthermore, tool bloat blows up the agent context leading to unpredictable results and impacting operationalization of the agent. Agent Sandbox 2.0 gives developers a fast and easy setup environment with greater control.  


What It Delivers:
A sandbox that operates at developer speed, invoked by a single command-line with MCP monitoring, control and additional security controls. The sandbox provides process and file system isolation, full auditing of process and tool execution, while enforcing transport protocol and restricting server connections.  Full MCP protocol event visibility and control is also supported via the Agent Sandbox 2.0. It works with CrewAI, LangChain, Google ADK, and others out of the box.


Real Impact:
In early testing, Sandbox 2.0 contained poisoned tools from attempting to execute code injection exploits during MCP server connection initialization. Upon attack failure, the agent independently attempted a variation of the exploit which was also prevented by the sandbox.


Who it's for: AI agent developers who want to build fast without risking production infrastructure.


→ Request access to the Agent Sandbox 2.0


MCP Server Protection

Runtime guardrails across all three agentic boundaries: tools, data access, and code execution.


The Pain:
Securing agentic workflows requires more than visibility. Even when teams can see agent behavior, they lack pre-execution guardrails. MCP servers represent an inherent privilege escalation layer. When misconfigured or poorly implemented, they expose tools, data, and execution pathways without control.


What It Delivers:
MCP Server Protection integrates with any MCP server implementation to provide a secure-by-default server workload with controls built inside. It monitors and controls actions across all three agentic boundaries: visibility into tool execution with protection from destructive tools, prompt jailbreaks, and poisoning; data access controls that limit scope and prevent exfiltration; and a Code Execution Shield that blocks code injection, remote code execution, deserialization attacks, and privilege escalation exploits. Enforcement happens pre-execution, before damage occurs.


Real Impact:
Left unchecked, an agent or an attacker can inadvertently or deliberately execute risky tools.  Agents can enumerate entire data repositories by passing requests for downstream data stores or objects. BlueRock’s MCP Server Protection can easily block expansive tool arguments preventing privilege escalation and SSRF attacks, and consequently, mass data exfiltration via the MCP layer.


Who it's for: Developers and product teams building and publishing MCP servers.  


→ Learn more about MCP Server Protection


Two Ways to Start

We've designed BlueRock around how teams actually adopt agentic systems. You can start from the developer side or the security side. Both paths lead to the same unified platform.

Developer Path: Start → See → Control → Scale

  1. Start: Spin up Agent Sandbox 2.0 (zero-change or one-line CLI) and review the MCP Trust Registry before connecting servers

  2. See: Gain full action visibility via the Agentic Map

  3. Control: Enable guardrails for tools, data, and execution

  4. Scale: Roll out across multi-agent environments with consistent policies


Best for: Teams building new agentic workflows who want to move fast without compromising safety.

Product Security Path: Discover → Assess → Secure → Integrate

  1. Discover: Use the MCP Trust Registry to inventory and rate MCP servers

  2. Assess: Deploy runtime visibility to see agent + server telemetry

  3. Secure: Turn on guardrails by boundary (tools, data, execution)

  4. Integrate: Automate security checks in CI/CD and IaC pipelines


Best for: Security and platform teams securing existing agentic deployments at scale.

Fast, Easy and Flexible Deployment

BlueRock agentic protection is built “inside” workloads.  It operates where agentic actions actually occur, not at the edge. We support two deployment modes: launching a workload instance or container or building on top of Sandbox 2.0


Fast Mode (DevOps): Launch BlueRock via a container or machine image. In three minutes or less, agentic protection is running in an environment for developers to build their agentic workflows.  Every instance/node running is default protected by BlueRock.


Flex Mode (Builders): Build your agent or MCP server.  Launch Sandbox 2.0 via a single command-line and your agent is running inside or have an agent framework launch the sandbox. Launch your MCP server and get tool visibility and control. Devops can easily integrate the sandbox and/or MCP server into their CI/CD.


Compatibility:

  • Agentic platforms: CrewAI, LangChain, Google ADK and many more

  • MCP servers: Python (now), Java (now), Node.js / TypeScript (Q1)

  • Infrastructure: AWS, Azure (Q1), GCP (Q1)

  • BlueRock Pre-Packaged Images: Amazon Linux 2023 v6.12, Ubuntu v24.x, Amazon Bottlerocket v1.43 

  • Observability: Any OTEL-native event collector

  • IaC: Terraform, CloudFormation

Get Started in Minutes

Ready to secure your agentic workflows? Choose your starting point:

Visit the MCP Trust Registry:
Review security ratings and risk intelligence for MCP servers and tools (free).
→ Explore at mcp-trust.com
Deploy the Secure MCP Server:
Launch a hardened, secure-by-default MCP server with BlueRock runtime guardrails built in. Available now on AWS Marketplace (free).
→ Visit AWS Marketplace
Try Agent Sandbox 2.0:
Get early access to build and test agents safely with full action visibility and control. Compatible with CrewAI, LangChain, and other major frameworks.
→ Request Access
See the full platform:
Schedule a demo to explore how the MCP Trust Registry, Agent Sandbox 2.0, Agentic Visibility, and MCP Server Protection work together.
→ Schedule a demo



Move fast. Stay safe.

If you're building agentic workflows or MCP servers, depend on BlueRock.



Frequently Asked Questions

What is the BlueRock Agentic Protection Platform?

The BlueRock Agentic Protection Platform is the first security platform purpose-built to see and secure agentic actions across tools, data access, and code execution before they run. It includes four core products: MCP Trust Registry for server risk intelligence, Agent Sandbox 2.0 for safe development, Agentic Visibility for complete action mapping, and MCP Server Protection for runtime guardrails.

What are the Three Agentic Boundaries?

The Three Agentic Boundaries are the execution paths where all agent risk occurs: Tools Boundary (MCP tool invocations and parameters), Data Boundary (data access, transformation, and exfiltration), and Execution Boundary (shell commands, subprocesses, and code execution). Every agentic incident maps to one or more of these boundaries.

How is BlueRock different from AI gateways?

AI gateways are bolt-on solutions that inspect requests at the edge but can be bypassed by developers and miss what agents actually do at runtime. BlueRock is built-in to the agent and MCP runtime layer, seeing every tool call, data access, and execution step with enforcement at the moment of action—not the moment of request. Gateways see intent; BlueRock sees and secures actions.

What deployment options does BlueRock support?

BlueRock supports two deployment modes: Fast Mode launches via container or machine image (3 minutes to protection), and Flex Mode uses Agent Sandbox 2.0 via single command-line or builds on top of it. Both modes provide identical visibility and guardrails. BlueRock works with CrewAI, LangChain, Google ADK, and supports Python, Java, and Node.js MCP servers.

How do I get started with BlueRock?


You can start in multiple ways: Visit the free MCP Trust Registry for server risk intelligence, deploy the secure MCP server from AWS Marketplace (free), request early access to Agent Sandbox 2.0 for safe agent development, or schedule a demo to see the full platform.

Gradient

The Agentic Protection Platform Is Live

See and secure autonomous agent actions across tools, data, and execution before they run.

Over 20,000 new MCP servers are published monthly.

Security is the #1 impediment to agentic adoption BlueRock removes that blocker.

Gradient

The Agentic Protection Platform Is Live

See and secure autonomous agent actions across tools, data, and execution before they run.

Over 20,000 new MCP servers are published monthly.

Security is the #1 impediment to agentic adoption BlueRock removes that blocker.

Gradient

The Agentic Protection Platform Is Live

See and secure autonomous agent actions across tools, data, and execution before they run.

Over 20,000 new MCP servers are published monthly.

Security is the #1 impediment to agentic adoption BlueRock removes that blocker.