Aikido

Secure developer workstations at the source

One agent covers package installs, IDE extensions, and AI tools. Runs in the background and only surfaces when something gets blocked.

Your data won't be shared · Read-only access · No CC required
Trusted by 50k+ orgs
|
Loved by 100k+ devs
|
4.7/5
SOURCES

Protect every developer workstation from malicious code

AI Tools & Models

Windsurf
Cursor
Gemini
Anthropic
OpenAI
Github
Copilot
xAI
MCP
Servers
LangChain
Claude Code

Package Registries

NPM
Maven
PyPi
NuGet

IDE & Browser Extensions

JetBrains
VS 
Code
OpenVSX
Firefox
Visual
Studio
Chrome
HOW IT WORKS

Aikido Endpoint runs in the background, blocking threats before they land.

Detects

Which AI tools, package installs, and extension downloads, pass through Aikido's agent. You see exactly what's running on every developer workstation before it becomes a problem.

Prevents

Known malware is blocked before it touches the filesystem. Not flagged after. Not quarantined later. Stopped before it's downloaded.

Enables

Blocked installs trigger an exception request. Developers aren't stuck, admins approve in one click. Without having to wait or create a ticket.

One agent, deployed through your existing MDM, gives security teams full visibility into AI tool usage and software installs across every developer workstation.

Developers are using AI tools your security team has never reviewed

See every AI tool
Know exactly which AI models, services, and agent skills each developer is using across your entire fleet, in real time.
Block risky plugins
MCP servers and AI agent skills can run arbitrary code. Aikido lets you block or approve them before anything runs.
Detect prompt injection
Every call to an AI service is inspected for injection patterns. Attacks blocked before they reach the model.
SETUP

Get up and running in a few minutes

Step 1

Deploy to workstations

Deploy through the MDMs like Jamf, Fleet, or Kandji. No new infrastructure. Manage global and team-level permissions in the Aikido platform.

Step 2

Block threats before they reach the filesystem

Every package install and extension download passes through Aikido's local agent, checked against live malware intelligence before anything touches the filesystem.

Step 3

Monitor packages and AI usage

Continuous scanning of everything installed, not just new installs. If a trusted package is later compromised, Aikido flags it and removes it automatically.

AIKIDO INTEL

Powered by Aikido's supply chain attack feed

Supply chain attacks are escalating fast: Trivy, Cannisterworm, LiteLLM, and Axios, all got hit recently.

Malicious packages are slipping into npm and PyPI, executing on install before teams know something's wrong.

Aikido Intel continuously detects malicious packages across npm, PyPI, and more. Every detection is automatically pushed to the block list on connected workstations, before any developer can install it.

Start for Free
No CC required

Your developers install thousands of packages a year. Secure them today.

Most security tools ask developers to slow down. Aikido just makes sure nothing dangerous gets through.

Your data won't be shared · Read-only access · No CC required
“Aikido’s automation and accuracy help our teams focus on building, not babysitting vulnerabilities.”
Arsalan Ghazi
Head of AppSec, Revolut
FAQ

Frequently Asked Questions

Is malware always blocked, even if a developer requests an exception?

Yes. Malware is always blocked. No exceptions or policies can override it. Other controls like Force Requests or Block All Installs can be overridden by admins for specific teams or packages. Malware cannot.

How are malicious packages detected?

Aikido maintains an threat intelligence feed: Aikido Intel. It actively scans new packages using a mix of static rules and AI. Suspicious packages are flagged and our in-house research team investigates from there.

How does Aikido Endpoint compare to using a private registry (for example, NuGet)?

Aikido Endpoint provides broader protection across many ecosystems, while a private registry is best when you need tight control within one specific ecosystem.

How does Aikido Endpoint work technically?

It intercepts HTTP traffic at the kernel level, including TLS-encrypted traffic by adding a local CA, and it is designed to work in a chain with other traffic inspection solutions (as the first link).

How does Aikido interact with our existing EDR?

Aikido Endpoint operates at the package, extension, and AI layer. It complements EDR rather than replacing it. EDR catches threats after they are running. Aikido stops them from running in the first place.

How is this different from blocking AI tools at the network level?

Network blocks are coarse and easy to route around. A developer on a personal hotspot can bypass them entirely. Aikido operates at the workstation level, per developer, per tool. You get granular control and a real audit trail, not a firewall rule that creates the illusion of control.

What is minimum package age and why does it matter?

Minimum package age holds installs of recently published packages. The default is 48 hours. This stops a common supply chain attack. An attacker publishes malicious code to npm or PyPI and tries to get developers to install it before the community can flag it.

What ecosystems are covered?

NPM, PyPI, Maven, NuGet, VS Code extensions, Open VSX, and Chrome extensions.

What if developers use personal accounts or consumer AI tools?

Aikido observes traffic at the workstation level regardless of which account a developer is using. If a tool is making outbound calls to an AI service, Aikido sees it. This is true whether it is a corporate license or a personal account.

Does Aikido's endpoint protection have Windows and Linux support?

Windows and Linux support are coming out soon. Availability is likely in Q3 2026