Skip to contentAgent? Read agent.txt

Introduction

Install Decoy, run your first scan, and deploy a tripwire in under five minutes.

Decoy is a security platform for AI agents and MCP servers. It ships three surfaces you compose to fit your stack: a static scanner, runtime tripwires, and an MCP-native threat intelligence service.

This guide gets you from zero to a working scan and deployed tripwire. If you'd rather browse by product, head to the product overview.

Install the CLI

Decoy ships as a zero-dependency npx-runnable binary — no global install, no daemon, nothing to uninstall later.

npx decoy-scan

On first run, the CLI discovers every MCP server configured on your machine (Claude Desktop, Cursor, VS Code, and more) and runs the full check suite against each one.

Run a scan

decoy-scan exits 0 on clean runs, 1 on high-risk findings, and 2 on critical or poisoning findings. Drop it into CI without any extra glue.

Deploy a tripwire

Tripwires are decoy tools your agent never needs to call — but a prompt injection almost always will. Any invocation gets captured, attributed to the offending prompt, and surfaced in the Decoy console.

See the Tripwire overview for the trigger model and a walkthrough of the default tool set.

Where to next