Documentation Index
Fetch the complete documentation index at: https://quintsecurity.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
Agent Bill of Materials
Every AI agent session in your organization leaves behind an audit-ready record. Quint captures the full runtime composition — model, framework, tools, data, risk — and exports it as a standards-compliant Agent Bill of Materials. This is what EU AI Act compliance looks like operationally.Why Agent BoM, not Model BoM
Existing AIBOM products (HiddenLayer AISec 2.0, Manifest AI Risk, Cycode, Wiz) inventory models: architecture, training data, weights provenance, known CVEs. That is one layer of the stack. An AI agent is a composite system:| Layer | Model BoM covers | Agent BoM covers |
|---|---|---|
| Model | Architecture, version, parameter count, training data | Same, per-session invocation |
| Framework | — | Claude Code, Cursor, Copilot, LangChain, CrewAI |
| Tools / MCP | — | Every MCP server connected, every tool called, arguments |
| Data access | Training datasets | Runtime files read/written, APIs hit, data classifications |
| Cloud services | — | Bedrock, OpenAI, Vertex endpoints touched |
| Orchestration | — | Sub-agent spawns, delegation chains, parent-child graph |
| Risk | Static vulnerability scan | Per-session behavioral risk score |
Standards Landscape
CycloneDX ML-BOM (OWASP / Ecma TC54)
CycloneDX v1.7 (ECMA-424, published 2025-12-10) supports component typemachine-learning-model with a modelCard object containing modelParameters (task, architectureFamily, approach, datasets) and quantitativeAnalysis (performance metrics). It also supports services for external API endpoints and data components for datasets. The spec is extensible via properties using reserved namespaces like cdx:ai-ml:*.
Quint fit: CycloneDX’s services object maps cleanly to MCP servers. components maps to models and tools. dependencies captures the agent’s composition graph. We render per-session output as CycloneDX JSON.
SPDX 3.0 AI + Dataset Profiles (Linux Foundation)
SPDX 3.0 added AI and Dataset profiles as first-class supply chain elements. The AI profile tracks software frameworks, libraries, versions, licenses, and security references for AI/ML systems. The G7 Cybersecurity Working Group published “A Shared G7 Vision on SBOM for AI” (June 2025) endorsing SPDX-based AIBOMs. Quint fit: SPDX is stronger on licensing and provenance. We support SPDX export for customers in regulated industries where SPDX is mandated.Industry adoption
CycloneDX has broader tooling adoption for security use cases (OWASP ecosystem). SPDX has stronger government and open-source backing. Both are machine-readable JSON. Quint exports both; CycloneDX is the default because itsservices and modelCard objects map more naturally to agent runtime data.
Compliance Framework Mapping
EU AI Act — Article 11 / Annex IV
Annex IV requires technical documentation covering 9 categories for high-risk AI systems. Quint’s per-session AIBOM directly addresses:| Annex IV Requirement | Quint AIBOM Field |
|---|---|
| 1(a) Intended purpose, provider, version | model.id, model.version, framework |
| 1(b) Interaction with other AI systems | mcp_servers[], services_touched[] |
| 4. Development process, design specs | framework, model.provider |
| 5. System architecture, computational resources | components[], cloud_services[] |
| 6. Data requirements, provenance | data_fields_accessed[] with classifications |
| 7. Validation & testing metrics | risk_score, per-tool risk breakdown |
| 9. Post-market monitoring | Continuous per-session generation = live monitoring |
NIST AI RMF 1.0 — Govern / Map / Measure / Manage
| Function | Subcategory | AIBOM Role |
|---|---|---|
| Govern | 1.1 Legal/regulatory requirements documented | AIBOM generation policy = documented AI governance |
| Map | 1.1 Intended purpose contextualized | Per-session framework + model + tools = full context |
| Measure | 2.6 AI system performance assessed | risk_score + tool-level metrics per session |
| Manage | 2.2 Mechanisms to track AI risks | Continuous AIBOM stream = live risk telemetry |
| Manage | 4.1 Post-deployment monitoring | Session-level granularity exceeds typical monitoring |
ISO/IEC 42001 — AI Management System (AIMS)
ISO 42001 requires documented procedures across the AI lifecycle (Clause 8), system-level documentation for each AI system in scope, and a Register of AI Resources (Controls A.4.2-A.4.6). Quint’s AIBOM auto-generates the per-system documentation that auditors expect: what model, what data, what tools, what risk — per session, continuously.SOC 2
SOC 2 does not explicitly require AIBOM-like documentation. However, the Common Criteria for Security (CC6) and Availability (A1) require evidence that system components are inventoried and monitored. For organizations using AI agents in production, auditors increasingly ask “what AI is running and what can it access?” The AIBOM is the answer.Quint AIBOM Schema
Every session produces a signed JSON record. The schema:Field reference
| Field | Type | Description |
|---|---|---|
session.id | UUID | Cloud session identifier (SHA1-UUID5 of local pid+timestamp) |
model.id | string | Exact model identifier as observed on the wire |
model.endpoint | string | API endpoint the model was called through |
framework.name | enum | claude-code, cursor, copilot, continue, aider, custom |
mcp_servers[].tools_called | string[] | Subset of exposed tools actually invoked this session |
data_fields_accessed[].classification | enum | public, internal, confidential, restricted, pii, phi, source_code |
risk.session_score | float | 0.0-1.0 composite risk score for the entire session |
signature | object | Ed25519 signature over the canonical JSON, proving provenance |
CycloneDX Export Mapping
Quint’s per-session JSON renders to CycloneDX 1.7 as follows:| Quint Field | CycloneDX Object | CycloneDX Field |
|---|---|---|
model.* | components[type=machine-learning-model] | name, version, purl, modelCard.modelParameters |
framework.* | metadata.tools[] | name, version |
mcp_servers[] | services[] | name, version, endpoints[] |
tools_called[] | services[].data.flow | Direction + classification |
data_fields_accessed[] | services[].data[] | classification, flow |
cloud_services_touched[] | services[] | endpoints[], authenticated, trustZone |
sub_agents[] | components[type=machine-learning-model] | Nested with dependencies[] |
risk.* | vulnerabilities[] or properties[] | cdx:quint:risk:session_score |
signature | metadata.component.hashes[] | Integrity verification |
dependencies array captures the composition: session depends on model, model depends on MCP servers, MCP servers depend on tools. This is the agent graph that Model BoMs cannot express.
PDF Report Layout
For compliance auditors who need paper.Page 1: Executive Summary
Pages 2+: Detailed Appendix
- Full tool invocation log with timestamps
- Data access table with classifications and sensitivity tiers
- MCP server manifest with exposed vs. called tools
- Sub-agent tree with prompt hashes
- Risk score breakdown by event category
- Raw CycloneDX JSON (machine-readable appendix)
Sales Positioning
The pitch: “Every AI agent session in your org already leaves a trace. Quint captures it, scores it, signs it, and exports it as a standards-compliant bill of materials. When your auditor asks what your AI agents accessed last Tuesday — you have the answer in CycloneDX JSON or a one-page PDF. That is what EU AI Act Article 11 compliance looks like in practice.” Differentiation from HiddenLayer / Manifest / Cycode:| Capability | HiddenLayer | Manifest | Cycode | Quint |
|---|---|---|---|---|
| Model inventory | Yes | Yes | Yes | Yes |
| Model vulnerability scan | Yes | Yes | Yes | — |
| Training data provenance | Yes | Partial | — | — |
| Per-session runtime capture | — | — | — | Yes |
| Agent tool/MCP tracking | — | — | — | Yes |
| Runtime data access log | — | — | — | Yes |
| Behavioral risk scoring | — | — | — | Yes |
| Ed25519 signed records | — | — | — | Yes |
| CycloneDX export | Partial | — | — | Yes |
Implementation Notes
Quint already captures the raw data for every field in this schema:- Model + endpoint: Observed on the wire by the forward proxy (MITM layer)
- Framework detection: User-agent parsing + process tree analysis by ES extension
- MCP servers + tools:
MCP_TOOL_CALLevents from the ES extension - Data access:
FILE_READ,FILE_WRITE,HTTPS_REQUESTfrom ES + NE - Sub-agents: In-process subagent detector (FNV-1a prompt hash)
- Risk score: Per-event scoring pipeline, aggregated per-session
- AIBOM serializer — aggregate session events into the JSON schema above
- CycloneDX renderer — map Quint JSON to CycloneDX 1.7 JSON
- SPDX renderer — map to SPDX 3.0 AI profile (lower priority)
- PDF generator — executive summary + appendix from the JSON
- Ed25519 signing — sign canonical JSON at session close
- API endpoint —
GET /v1/sessions/:id/aibomreturning the signed record - Dashboard export button — “Download AIBOM” on session detail view