Documentation Index
Fetch the complete documentation index at: https://quintsecurity.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
Data Flow
Install the Endpoint Agent
Configure and enroll
Run setup with your deploy token (created in the dashboard or via API):This writes the config to
/etc/quint/config.yaml:Start the daemon
The daemon runs as a The daemon begins detecting AI agents on your machine and streaming events to the cloud API.
LaunchDaemon managed by launchd — it starts automatically after setup and survives reboots. To manage it manually:Use your AI agents normally
Start any AI agent as you normally would. Quint detects them automatically via code signing:Open the dashboard at app.quintai.dev to see sessions, events, and detected agents across your fleet.
API Quick Test
Verify your deployment is working by hitting the API directly.List events (authenticated)
Use your deploy token or Supabase JWT:Filter by agent, session, action type, or time range:
Deploy Token Management
Deploy tokens are how machines authenticate with the cloud API. Create them from the dashboard or via the API:qt_deploy_ prefix and are SHA-256 hashed before storage. The raw token is shown only once at creation time.
What Gets Captured
When an AI agent runs on a machine with Quint installed, the daemon captures:| Action Type | Example |
|---|---|
PROCESS_EXEC | Agent spawns git commit, npm install, curl |
FILE_READ | Agent reads source code, config files, .env |
FILE_WRITE | Agent modifies code, creates files |
FILE_DELETE | Agent removes files |
NETWORK_CONNECT | Agent makes outbound network connections |
tool_name (binary basename), arguments (process args), session_id (UUID v5), and the detected agent_id.
Configuration
The daemon config lives at/etc/quint/config.yaml: