Three independent roles reaching consensus before any agent action touches your workspace. Operator + Agent + Authority Anchor.
For decades, application security assumed one enforcer: the tool watching the process. AI agents broke that model. An agent asked politely to do something harmful will usually do it. An agent prompted to ignore its guardrails often will. The tool watching from outside cannot see what's happening inside the agent's reasoning.
The AI Security Triad solves this with three independent roles. Any one of them can be compromised, misled, or coerced — and the other two still reach the right answer.
You. Has intent, holds authority, retains the right to override.
Your AI agent. Security-aware. Queries the Authority Anchor before acting. Cites policy under pressure.
Dryx. Deterministic, offline, isolated ground truth. Cannot be prompt-injected.
AI agents are the fastest-growing enterprise attack surface. Palo Alto Networks paid $1.2 billion for Koi in April 2026 to acquire agent visibility. Noma Security raised $100 million at 1,300% ARR growth. Vercel disclosed a supply-chain breach the same week — one employee granted an AI tool broad OAuth, which became a master key when that tool was compromised. Then in May 2026, security researchers found 200,000 MCP servers exposing remote code execution; Anthropic confirmed it was by-design and declined to patch.
The category needs a name. The problem is three parts: agents that can be prompted into unsafe actions, security tools that cannot see inside agent reasoning, and operators who cannot audit the permissions their tools have accumulated. The AI Security Triad names the shape of the defense — independent verification across all three roles.
Today, on macOS, across nine major AI agent platforms, under one unified Authority Anchor protocol:
Multi-party consensus · Policy directive injection · Adversarial request resistance · Behavioral baseline · Orphaned configuration detection · Pre-deployment blast radius · Multi-layer enforcement · Plus 4 prior cybersecurity provisional filings. Priority date April 2026. Inventor: Matthew Jackson.
A fresh Claude Code session. A memory MCP install request. A formal security verdict. An agent holding the line. No staging, no hand-waving — on a real machine. End-to-end signed authority.
See Dryx → Get early access