Skip to main content

Documentation Index

Fetch the complete documentation index at: https://quintsecurity.mintlify.app/llms.txt

Use this file to discover all available pages before exploring further.

System Architecture

Quint is a three-tier security platform that combines OS-level ground truth (EndpointSecurity system extension), intent-level interception (forward proxy plus MCP gateway), and a cloud platform for fleet-wide visibility. The key security signal is divergence between what an agent claims to do and what actually happens on disk.

Three-Tier Architecture

Tier 1: Edge

Runs on the user’s machine as a signed .pkg install.
  • QuintAgent.app hosts two system extensions:
  • Go daemon runs as a LaunchDaemon. It operates the forward proxy (MITM TLS plus MCP relay/gateway), the unified session tracker, and the cloud forwarder. Events stream to api.quintai.dev via HTTPS.
  • Audit log at ~/.quint/quint.db with Ed25519 signatures and SHA-256 hash chaining. Every captured request, response, and tool call is attributable to a specific session.

Tier 2: Cloud Platform

Deployed on AWS ECS Fargate. Five services share one Postgres instance and one Redis cache:
ServiceRole
ingestAuthenticate, validate, fan out to SNS
pipelineConsume SQS, write actions table
session-processorUpsert sessions table
alert-processorEvaluate rules, write alerts
apiDashboard and public API
Row-level security is enabled on all tenant tables using app.current_org_id. The actions table is partitioned by month. See Cloud Overview for the full model.

Tier 3: Dashboard

Next.js on Vercel. Reads from the API service over Supabase JWT or API key. Session-centric views with drill-down into each action. See Dashboard Architecture.

Signal: Intent vs. Truth

The proxy sees what the agent claims to do. The ES extension sees what the OS actually does. Divergence is the high-confidence signal. Example: an agent that says “read config.json” but actually opens ~/.ssh/id_rsa. Tier 1 captures the tool call. Tier 2 captures the file open. The mismatch triggers an alert.

End-to-End Flow

See How It Works for a single tool call traced through all layers.

Deployment Topology

Production (AWS)

ServiceResourcesPurpose
API ServiceECS FargateREST API, event ingest
IngestECS FargateToken auth, validation, fan-out
PipelineECS FargateSQS consumer, Postgres writer
Session ProcessorECS FargateSession lifecycle upserts
Alert ProcessorECS FargateRule evaluation
PostgreSQLRDS t4g.mediumEvents, sessions, partitioned by month
RedisElastiCache t4g.microL1 cache, rate limiting, SSE pubsub
ALBElastic Load BalancerHTTPS termination with ACM certificate
Infrastructure is fully Terraformed under quint-platform/infra/terraform/environments/prod/.

Endpoint (macOS)

ComponentFootprintPurpose
QuintAgent.app~20MB diskContainer for system extensions
ES Extension~50MB RAM steadyOS-level event capture
NE Extension~40MB RAM steadyTransparent network interception
Go Daemon~100MB RAM steadyProxy, session tracking, forwarder
Local SQLite10-100MBSigned audit log (rolling)

Security Properties

Source code content, credentials, and full LLM conversation bodies never leave the machine. Only structured metadata (tool name, capability, risk decomposition) goes to the cloud.
  • Audit log tampering: Ed25519 signature per row, chained by prev_hash. A single modification breaks the chain.
  • TLS MITM: per-hostname leaf certs signed by a local CA that never leaves the machine.
  • Cloud auth: deploy tokens are SHA-256 hashed in Redis, JWT for dashboard users.
  • Tenant isolation: Postgres RLS on every tenant table, SNS/SQS FIFO ordering per session.

Design Principles

  1. Local-first capture, cloud-first scoring. Raw bodies stay on the machine. Normalized events flow to the cloud.
  2. Lossy at the edge, durable in the cloud. Under backpressure, the edge drops events rather than block user traffic. The cloud retries.
  3. Zero client changes where possible. Forward proxy plus NE means no SDK integration, no new endpoints.
  4. Session-centric model. Everything anchors to sessions, not raw events. Audit rows, cloud events, and dashboard views all join on session_id.
  5. Code signing first. Agent detection uses macOS code signing as the highest-confidence signal, falling back to process name and path matching only when signing data is unavailable.
  6. Tenant isolation at every layer. Deploy tokens are scoped to organizations. Postgres uses monthly partitions with row-level security. Cloud queues use FIFO ordering keyed by session.