Patent-pending across 11 filings · Live on macOS

The AI Security Triad

Three independent roles reaching consensus before any agent action touches your workspace. Operator + Agent + Authority Anchor.

The three roles

For decades, application security assumed one enforcer: the tool watching the process. AI agents broke that model. An agent asked politely to do something harmful will usually do it. An agent prompted to ignore its guardrails often will. The tool watching from outside cannot see what's happening inside the agent's reasoning.

The AI Security Triad solves this with three independent roles. Any one of them can be compromised, misled, or coerced — and the other two still reach the right answer.

Operator

You. Has intent, holds authority, retains the right to override.

Agent

Your AI agent. Security-aware. Queries the Authority Anchor before acting. Cites policy under pressure.

Authority Anchor

Dryx. Deterministic, offline, isolated ground truth. Cannot be prompt-injected.

↓ Consensus before any action ↓

The closed loop

Watch the agent's hands get tied. When Claude Code asks Dryx whether to install an unsigned skill, the verdict isn't a recommendation — it's a structured JSON response the agent treats as authoritative. The agent stops. End-to-end signed authority. Verdicts survive process compromise.

Why this matters now

AI agents are the fastest-growing enterprise attack surface. Palo Alto Networks paid $1.2 billion for Koi in April 2026 to acquire agent visibility. Noma Security raised $100 million at 1,300% ARR growth. Vercel disclosed a supply-chain breach the same week — one employee granted an AI tool broad OAuth, which became a master key when that tool was compromised. Then in May 2026, security researchers found 200,000 MCP servers exposing remote code execution; Anthropic confirmed it was by-design and declined to patch.

The category needs a name. The problem is three parts: agents that can be prompted into unsafe actions, security tools that cannot see inside agent reasoning, and operators who cannot audit the permissions their tools have accumulated. The AI Security Triad names the shape of the defense — independent verification across all three roles.

How Dryx implements the AI Security Triad

Today, on macOS, across nine major AI agent platforms, under one unified Authority Anchor protocol:

Patent-pending across 11 filings

Multi-party consensus · Policy directive injection · Adversarial request resistance · Behavioral baseline · Orphaned configuration detection · Pre-deployment blast radius · Multi-layer enforcement · Plus 4 prior cybersecurity provisional filings. Priority date April 2026. Inventor: Matthew Jackson.

What the AI Security Triad is not

Watch the AI Security Triad live

A fresh Claude Code session. A memory MCP install request. A formal security verdict. An agent holding the line. No staging, no hand-waving — on a real machine. End-to-end signed authority.

See Dryx → Get early access