Endor AURI puts a security control plane around coding agents
Endor Labs expanded AURI with Agent Governance and Package Firewall, shifting AI coding security from code review to runtime control.
- What happened: Endor Labs added
Agent GovernanceandPackage Firewallto AURI.- Agent Governance is in private preview, while Package Firewall is available as part of the AURI platform.
- Why it matters: AI coding security is moving from checking generated code to controlling the environment where agents execute work.
- Prompts, shell commands, file access, tool use, and package installation are becoming auditable policy surfaces.
- Builder impact: Teams adopting coding agents need to look beyond IDE extensions and review hooks, MCP servers, registry proxies, and CI policies together.
- Watch: The public Package Firewall examples still center on JFrog Artifactory with npm and pip flows, so integration coverage needs validation.
Endor Labs widened the scope of AURI on May 12, 2026. The company announced two additions: Agent Governance, which observes and applies policy to what coding agents actually do, and Package Firewall, which blocks malicious package installs before external code reaches a developer machine, CI job, or agent workflow.
At first glance this can look like another application security platform adding another module. The more interesting signal is the boundary shift. For the last year, the central AI coding security question has usually been: did the model write safe code? Endor's framing changes that question. What authority does the agent have while producing the code, what did it run, and can the organization control that execution path?
That is a large shift because coding agents are no longer autocomplete widgets. They run shell commands, install packages, read and write files, call MCP servers, and connect to external tools. Cloud agents can extend beyond a developer workstation into CI, temporary execution environments, remote branches, and issue trackers. In that setting, security cannot stop at a scanner attached to the final pull request. The process that produces the code has become a new operational surface.

AURI Started As Code Security For Agents
AURI was introduced by Endor Labs in March 2026 as an AI-native application security platform. The original argument was straightforward: coding agents can write code, but they often lack the full application context needed to judge security. An application is not a single file. It is a graph of services, functions, dependencies, container images, data flows, and change history. Security review only becomes useful when it understands that graph.
Endor built the AURI story around a code context graph. The official AURI page says the graph connects first-party code, open-source dependencies, container images, and data flow, then uses that context to reason about reachability and exploitability. This is also the familiar critique of traditional SAST and SCA tools: they can produce a large number of alerts, including vulnerabilities that are not reachable through real code paths.
The March launch was therefore mostly about feeding security context into coding agents. AURI connected through MCP, Skills, CLI, and developer workflows so agents and developers could review generated code and dependency changes earlier. The May announcement is the next step. Endor Labs is no longer only securing the output of agents. It is also treating the agents' behavior as something that needs records, policies, and enforcement.
Agent Governance Is A Ledger For Agent Behavior
Agent Governance targets a visibility problem. Once a company starts using coding agents at scale, basic operational questions become difficult to answer. Which agents are being used? Which models are connected? Which MCP servers and tools are available? Which commands were executed? Which files were read? Which packages were installed? Which prompt triggered the action?
Endor's announcement describes Agent Governance as a system of record for AI activity across developer workstations and cloud environments. The policy surface is not limited to code artifacts. Prompts, commands, file access, and tool use can become targets for real-time detection and blocking.
The integration point is the important part. Endor says Agent Governance integrates directly with hook systems in coding agents such as Cursor, Claude Code, and Gemini CLI. If that works in practice, it matters because a separate security gateway can easily fight the developer workflow. A policy layer attached to the hooks and permission points agents already expose has a better chance of becoming part of daily development rather than a separate approval ritual.
This model does not fit neatly into one older security category. It watches workstation behavior like EDR. It cares about file access and data movement like DLP. It controls automated execution paths like CI security. The trigger, however, is not only a human typing a command. It can be a model planning work and an agent carrying it out. That is why the phrase "Agent Governance" is useful even if it sounds broad: the durable asset is the agent activity log.
Package Firewall Moves Supply Chain Defense Earlier
Package Firewall is more concrete. When a developer or AI agent tries to install a package, the request is evaluated before the public registry serves the package. Endor's announcement names npm, PyPI, NuGet, Maven, and other major ecosystems. The public documentation currently gives its most detailed setup path through JFrog Artifactory, routing npm and pip requests through Package Firewall.
The documented flow is simple. Artifactory forwards the package request to Endor Labs Package Firewall. Package Firewall parses the ecosystem, package name, and version, then checks Endor's malware database. If the package is judged malicious, the request is blocked and the client sees a 404-style failure. If the package is allowed, Package Firewall responds with a 307 redirect so the package can be downloaded from the upstream registry.
That timing is the point. Supply chain attacks can enter the environment before code review, before a pull request, and before an SBOM scan. Coding agents make that timing more sensitive because package installation can become a side effect of a longer task. A human might pause at an unfamiliar package name. An agent working through a failing test or scaffolding a new integration may treat installation as a routine step.
Package Firewall moves the policy boundary to the registry edge. Instead of discovering "a malicious package was already installed," the organization can treat the install request itself as the security event. A generated npm install or pip install still becomes a network request, and network requests can be routed, logged, and blocked.
| Security boundary | Traditional code-centered security | AURI's expanded focus |
|---|---|---|
| Observed object | PR diff, dependency manifest, container image | Prompts, commands, file access, tool use, package installation |
| Blocking point | Review, build, and pre-deploy checks | During agent execution and before package download |
| Integration model | SCM, CI, SAST, SCA | Hooks, Skills, MCP, CLI, registry proxy |
| Core question | Is this code safe? | What is this agent doing, and is it allowed? |
Coding Agent Security Is Really A Permission Model
This announcement is easy to misread as just a product update. The larger theme is that coding agent security is also a permission model problem. Better model capability can reduce some errors, but more capable agents also receive more delegated work. When the radius of delegation expands, the radius of failure expands too.
Take a simple example. An agent tries to fix a test and decides to install a new package. From a productivity perspective, that is normal. From a security perspective, outside code has just entered the workstation or CI environment. Even if the package is legitimate, license posture, maintenance quality, known vulnerabilities, and transitive dependencies may matter. If the package is malicious, install scripts can steal secrets or run remote code. When agents automate this flow, speed increases, but so do the gaps around approval and observation.
Agent Governance addresses the "who ran what" side of the problem. Package Firewall addresses the "what entered the environment" side. The pairing is not accidental. One feature creates records and policies for behavior. The other creates a blocking point for dependency intake.
Together they describe a practical minimum for operating coding agents. Teams need to know which tools and permissions an agent can use. They need records of agent actions. They need a way to stop risky behavior while work is running. They also need a separate policy point for external package intake. Without those four pieces, coding agents may be productive experiments, but they are harder to treat as standard enterprise development infrastructure.
The Public Documentation Shows Useful Limits
The Package Firewall documentation is worth reading because it shows both promise and limits. The 404 failure mode for malicious packages uses behavior that package managers and CI systems already understand. The 307 redirect for allowed packages means teams do not necessarily need a custom client. Package Firewall enters the registry path instead of asking every developer to learn a new security workflow.
The constraints matter just as much. In the public documentation, JFrog Artifactory is the concrete front-end registry proxy. npm and PyPI have the clearest examples. The Package Firewall API key needs the SYSTEM_ROLE_PACKAGE_FIREWALL role. The docs also warn that if Artifactory has already cached a package and that package is later classified as malicious, Artifactory may continue serving it until the cache expires. That is an important operational detail. A registry proxy is not magic. Cache TTLs, upstream routing, log access, and exception policy all become part of the design.
Agent Governance is also in private preview. The direction is clear, but buyers still need to test actual coverage. Cursor, Claude Code, Gemini CLI, and other agents expose different hook and permission models. MCP calls, shell commands, file access, network activity, and browser automation are not always represented in the same way. It would be too strong to assume one integration covers every agent action equally.
That is why this announcement is better read as a signal about architecture than as a claim that one switch solves agent security. The control points are not all inside the IDE. They are distributed across hooks, MCP servers, CLIs, registries, CI, and cloud runtimes. Security teams need a map of agent execution paths before a scanner inventory will be enough.
Supply Chain Attacks Become Sharper In The Agent Era
Endor's announcement points to open-source malware growth and npm maintainer account takeover risk. Those claims appear inside a vendor announcement, so they should not be treated as neutral market measurement on their own. The direction, however, is hard to ignore. Attackers have targeted package ecosystems for years, and coding agents make package selection and installation faster.
The agent era makes supply chain attacks harder in two ways. First, the install decision can become part of the agent's intermediate plan rather than a clearly deliberate human choice. Second, the agent may operate with permissions similar to the developer's permissions, or sometimes broader. If a malicious package runs in an environment with local tokens, repository write access, cloud credentials, or CI secrets, the damage can go well beyond a bad dependency.
That makes installation-time defense more than an SCA add-on. It is runtime policy for a behavior that coding agents are likely to perform. It is not sufficient by itself. Teams still need lockfile review, provenance, package signing, sandboxed execution, least privilege, and secret isolation. But treating each package install as a security event is likely to become more important as agent workflows become longer and more autonomous.
What Development Teams Should Check Now
Teams already using coding agents can turn this announcement into a concrete checklist. Which commands can the agent execute automatically? What are the read and write boundaries for files? Is network access constrained? Can a new package be installed without human approval? Who registers and reviews MCP servers? Are the resulting logs detailed enough for incident response?
Those questions are vendor-independent. They apply to Codex, Claude Code, Cursor, Gemini CLI, OpenHands, and internal agents. The productivity argument encourages teams to give agents broad permissions. Enterprise operations require those permissions to be observable, limited, and reversible.
This is the point Endor Labs is targeting with AURI. The message is not that agents should be blocked. It is that once agents are treated as part of the development infrastructure, they need the same operational primitives other infrastructure gets: logs, policies, blocking points, and supply chain controls.
The Competition Is Around Control Planes
The AI development tooling market is moving beyond the agent itself toward the control plane around the agent. UiPath wants coding agents to sit inside enterprise automation and orchestration. Coder wants to control self-hosted development environments where agents run. Cloudflare is approaching agent infrastructure from a runtime perspective. Endor Labs is attaching security intelligence and policy enforcement to this layer.
This is a different competition from benchmark quality. Enterprises will use multiple models and multiple agents at the same time. Models will change, editors will change, and runtimes will change. The parts that remain are permissions, audit trails, policy, network paths, and package boundaries. That is why more products are converging on the control plane layer.
The market is still early. Agent hook standards are immature. MCP is spreading quickly, but the security operating model is still left largely to individual teams. Registry firewalls differ by package manager, private registry, cache, mirror, and CI environment. The immediate need is not to pick a single winning product category. It is to draw the agent execution map and identify where policy can actually be enforced.
The Signal In Endor's Announcement
Endor Labs' AURI update is both a product expansion and a marker for the next security boundary in AI development. Checking AI-generated code remains necessary. It is no longer enough. Coding agents perform system actions while writing code. If those actions sit outside the security team's line of sight, the organization accepts a new blind spot alongside the productivity gain.
Agent Governance tries to reduce that blind spot with records and policy. Package Firewall moves an old supply chain boundary earlier, into the package installation path. Neither is a finished industry standard. Both show where enterprise AI development is starting to spend money.
For builders, the practical takeaway is direct. Treat commands, package installs, MCP connections, and file access as part of the product's security model. Treat agent logs as incident evidence, not merely debug output. Treat registry access as a control point, not plumbing. If a team cannot answer what an agent did and why it was allowed, the agent rollout is probably still an experiment rather than production infrastructure.
The next phase of AI coding will not be explained by smarter models alone. It will also be defined by how teams operate, observe, and limit agents that have real authority. The two AURI additions point in that direction: the development environment itself is becoming production infrastructure.