AI-SPM
Open-source runtime security control plane for AI agents in production
The Panel's Take
AI-SPM (AI Security Posture Management) is an open-source control plane for AI agent security in production environments. Built by indie developer dshapi and posted to Hacker News, it addresses a real gap: most LLM systems now have tool access and decision-making power, but almost no runtime oversight layer to catch when things go wrong. The system works as a gateway between your application and the LLM, enforcing three main controls: prompt injection detection (including obfuscated variants that bypass naive pattern matching), structured tool call validation against defined policies using Open Policy Agent (OPA), and sensitive data leakage prevention (PII and model output filtering). An Apache Kafka and Apache Flink streaming pipeline provides real-time audit trails and anomaly detection. The creator's key insight is that tool misuse — not model jailbreaks — is the primary risk vector in production AI agents. A rogue or compromised agent that escalates tool permissions or exfiltrates data through sanctioned channels is far harder to catch than a classic prompt injection. AI-SPM is early, minimal traction, and needs real-world stress testing. But as AI agent deployments mature from demos to production, runtime security tooling like this becomes non-optional.
Share this verdict
AI-SPM verdict: SKIP ⏭️ 2 ships · 2 skips from the expert panel Full review: shiporskip.io/tool/ai-spm-runtime-security-ai-agents-injection-tool-abuse-opa-2026
Weekly AI Tool Verdicts
Get the next verdict in your inbox
7 critics review a new AI tool every day. Weekly digest — free.
Compare AI-SPM with Others
Embed this verdict
Tool makers can add a live ShipOrSkip badge to their site. Badge loads track impressions; clicks route back to this review.
<a href="https://shiporskip.io/api/badge-click/ai-spm-runtime-security-ai-agents-injection-tool-abuse-opa-2026" target="_blank" rel="noopener"><img src="https://shiporskip.io/api/badge/ai-spm-runtime-security-ai-agents-injection-tool-abuse-opa-2026" alt="AI-SPM Skip verdict on ShipOrSkip" width="360" height="90" /></a>[](https://shiporskip.io/api/badge-click/ai-spm-runtime-security-ai-agents-injection-tool-abuse-opa-2026)<iframe src="https://shiporskip.io/embed/ai-spm-runtime-security-ai-agents-injection-tool-abuse-opa-2026" title="AI-SPM ShipOrSkip verdict" width="360" height="260" style="border:0;border-radius:16px;max-width:100%;" loading="lazy"></iframe>The reviews
“The OPA-based policy enforcement for tool calls is exactly the kind of control plane enterprises need before deploying agents in production. This is early but points in the right direction. If you're building agents with database or API access, you need something like this or you're flying blind.”
“One developer, one HN post, minimal engagement. The Kafka + Flink stack for a security gateway seems like significant over-engineering for most teams. And the creator openly admits that pattern-based injection detection is easily bypassed — so the core feature has known weaknesses. Not production-ready.”
“AI agent security is a category in its own right that barely existed a year ago. Every week there's a new story about an agent doing something unintended in production. AI-SPM is an early but important stake in the ground for what a mature runtime security layer for agentic systems should look like.”
“This is deeply infrastructure-layer stuff that doesn't touch my workflow at all. Important for the ecosystem but not something I'd evaluate or deploy.”