Documentation Index
Fetch the complete documentation index at: https://quintsecurity.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
Shadow AI Discovery
Last updated: 2026-05-03. Research sources cited inline.The Market: What Exists Today
CrowdStrike Falcon — Shadow AI Discovery + AI-SPM
CrowdStrike’s approach is sensor-first. The Falcon agent already sits on every managed endpoint, so they extended it to fingerprint AI processes. As of their May 2026 announcements, Falcon detects 1,800+ unique AI applications across enterprise devices (160M+ installations). Their Shadow AI Discovery surfaces:- AI applications and agents (ChatGPT, Claude, Cursor, GitHub Copilot, DeepSeek, Gemini)
- LLM runtimes (local model servers, inference frameworks)
- MCP servers (explicitly called out as a discovery target)
- IDE extensions and dev tooling with AI capabilities
Microsoft Defender for Cloud Apps + Entra Global Secure Access
Microsoft takes a network-traffic approach. Their Shadow AI discovery in Entra Global Secure Access inspects internet and Microsoft 365 traffic to detect connections to known generative AI applications, SaaS MCP servers, and AI Model Provider APIs (explicitly naming ChatGPT, Claude, DeepSeek, Anthropic Claude API). Discovered apps are matched against the Defender for Cloud Apps catalog — now 31,000+ apps, scored on 90+ risk factors across security, compliance, and legal categories. The catalog includes dedicated AI categories:- AI — MCP Server: public cloud services implementing Model Context Protocol
- AI — Model Provider: platforms/APIs delivering access to foundation models
Wiz AI-SPM
Wiz takes the agentless cloud-scanning route. Their AI-SPM discovers AI infrastructure across AWS, GCP, and Azure without deploying agents:- AI services: SageMaker, Vertex AI, Bedrock, Azure Cognitive Services
- Libraries/SDKs: Hugging Face, OpenAI SDK, LangChain in deployed workloads
- Training data: sensitive data feeding ML pipelines
- Inference endpoints: deployed models and serving infrastructure
Other Vendors
| Vendor | Feature Name | Approach | Differentiator |
|---|---|---|---|
| Harmonic Security | Shadow AI Detection | Browser extension + endpoint agent + MCP Gateway | Purpose-built SLMs that evaluate prompt sensitivity in milliseconds; inline blocking |
| Noma Security | AI Asset Discovery | Maps “every model, every agent, every MCP server, every data source” | Full dependency chain + approved AI supply chain concept; continuous red teaming |
| Portal26 | Shadow AI Engine | Network-based, 30-minute activation | 35+ risk detectors; GenAI audit vault (NIST/SOC2); intent analysis on prompts |
| Reco AI | Shadow AI Discovery | SaaS-layer discovery | Found OpenAI = 53% of shadow AI usage; 400+ day persistence of unsanctioned tools |
| Lasso Security | AI Agents Discovery | Network signals + CrowdStrike Falcon integration | Unified inventory across SaaS agents, copilots, and homegrown AI apps |
Analyst Framing
Gartner’s category is AI TRiSM (AI Trust, Risk and Security Management), defined in their February 2025 Market Guide. The framework has four layers:- AI Governance — policy, roles, accountability
- AI Runtime Inspection & Enforcement — real-time monitoring of prompts/outputs
- Information Governance — data classification, DLP for AI
- Infrastructure & Stack — securing the AI supply chain
What CISOs Actually Ask For
The research is unambiguous:- 92% lack full visibility into AI identities operating in their environment (Cybersecurity Insiders/Saviynt, April 2026)
- 86% don’t enforce formal access policies for AI identities
- Only 5% feel confident they could contain a compromised AI agent
- 75% have already found unsanctioned AI tools running in their environment
- 44% struggle with business units deploying AI without involving security (Delinea 2025)
- 54% have experienced data privacy incidents from Gen AI adoption (ISC2 2024)
- 39% of CISOs plan to increase DLP spending specifically because of Shadow AI (Cribl 2025)
Quint’s Design: Shadow AI Discovery
Why Quint Wins This
Every other vendor is bolting AI discovery onto an existing product (EDR, CASB, CNAPP). Quint is the only product that already sits at the execution layer of AI agents — intercepting every process, file operation, network call, and tool invocation. We don’t need to fingerprint AI apps from DNS logs or scan cloud APIs. We watch them work. What we already capture today per session:- Agent identity (Claude Code, Cursor, GitHub Copilot, Aider, etc.)
- PID, parent PID, process tree
- MCP tool calls (tool name, arguments, results)
- Files read/written/modified with sensitivity classification
- Network destinations (model API endpoints)
- Session duration, command count, risk score
API: /v1/inventory
statusfield:sanctioned | unsanctioned | unreviewed— mirrors Wiz’s classification modeldata_classifications_touched: derived from our existing file-path sensitivity heuristics, upgraded to proper classification tiers- MCP servers as first-class objects: we’re the only vendor that can enumerate tool names and invocation frequency per server
risk_score_avg: aggregate of per-session risk scores we already compute
Dashboard: “Shadow AI” Tab
Navigation: Dashboard sidebar gets a new “AI Inventory” tab between “Sessions” and “Settings”. Top-level view — Fleet Heatmap:- Grid of machines (rows) x agent types (columns), color-coded by risk score (green/yellow/red)
- Summary cards at top: Total Agents | Ungoverned Agents | MCP Servers | Ungoverned MCP Servers | Sessions (30d)
- Filter bar: team, machine, agent type, status (sanctioned/unsanctioned), date range
- Click any cell to see: agent version, all MCP servers connected, tools used, models called, data classifications accessed, session timeline
- “Mark as Sanctioned/Unsanctioned” action button per agent and per MCP server
- Risk trend sparkline (30-day)
- Tools available vs. tools actually invoked
- Which agents connect to this server
- Data flow summary: what data types pass through
- New unsanctioned agent detected (fires on first-seen of unreviewed agent type)
- MCP server with sensitive data access exceeds risk threshold
- Agent connecting to unapproved model endpoint
Sales Pitch
“Your developers are running AI agents with root-level access to your codebase, your secrets, and your production configs — and you have zero visibility into which agents, which tools, or which data they’re touching. Quint discovers every AI agent, every MCP server, and every tool invocation across your fleet in real time. Not from DNS logs. Not from cloud scans. From the execution layer — where the agent actually works.”Three sentences for a CISO who has never heard of Quint:
Quint is an endpoint sensor purpose-built for AI agents. It discovers every coding assistant, every MCP server, and every model API call across your developer fleet — showing you exactly what AI is running, what data it touches, and whether it’s sanctioned. Think CrowdStrike Falcon, but designed from day one for the AI attack surface.
What It Takes to Ship
| Work Item | Owner | Days | Dependencies |
|---|---|---|---|
/v1/inventory API endpoint | Amer | 2 | Existing session + event data; new SQL aggregation queries |
| Sanctioned/unsanctioned status model | Amer | 1 | New ai_asset_status table, migration |
| MCP server inventory extraction | Amer | 2 | Parse existing MCP_TOOL_CALL events to extract server identity |
| Agent type + version normalization | Amer | 1 | Extend existing agent fingerprinting in session processor |
| Dashboard: AI Inventory tab (heatmap + summary) | Hamza | 3 | API endpoint complete; reuse dashboard-v2 primitives |
| Dashboard: Agent detail drill-down | Hamza | 2 | API endpoint complete |
| Dashboard: MCP server detail view | Hamza | 1 | API endpoint complete |
| Dashboard: Sanctioned/unsanctioned toggle | Hamza | 1 | Status model API |
| Alert rules (new agent, risk threshold) | Amer | 1 | Existing risk scoring pipeline |
| Data classification tier upgrade | Amer | 2 | Replace path heuristics with proper 4-tier classification |
Sprint Plan: Week of 2026-05-05
Monday (Day 1)
- Amer:
ai_asset_statusmigration + table. Sanctioned/unsanctioned CRUD API. - Hamza: Wireframe AI Inventory tab. Set up route + nav entry in dashboard-v2.
Tuesday (Day 2)
- Amer:
/v1/inventoryendpoint — machine-level aggregation from existing session/event data. - Hamza: Heatmap component (machines x agents, color by risk). Summary cards.
Wednesday (Day 3)
- Amer: MCP server inventory extraction — parse MCP_TOOL_CALL events, deduplicate servers, build tool usage stats. Agent type normalization.
- Hamza: Wire heatmap to live API. Filter bar (team, status, agent type).
Thursday (Day 4)
- Amer: Data classification tier upgrade. Alert rules for new-agent and risk-threshold.
- Hamza: Agent detail drill-down view. MCP server detail view.
Friday (Day 5)
- Amer: Integration testing. Edge cases (machines with no agents, agents with no MCP).
- Hamza: Sanctioned/unsanctioned toggle UI. Polish + responsive.
- Both: End-of-week demo with real fleet data. Screenshot for sales deck.