FAQ
Questions security teams ask before reviewing AI-assisted delivery paths.
Clyra is intentionally narrow at the start: repo artifacts, PR-linked provenance, CI/CD, tools,
credentials, cloud paths, and release workflows involved in AI-assisted engineering.
What is Clyra?
Clyra helps AppSec, security engineering, and platform teams see which AI-assisted workflows
can change code, run CI/CD, use credentials, or reach production paths, then shows what
approval or evidence is missing.
Will this require access to source code?
The first assessment is designed for local or private scanning. Raw source is not retained unless
explicitly agreed. The output is a redacted action-control report, not a source archive.
Can this run locally?
Yes. The early assessment is built around local/private scans so security teams can evaluate
sensitive repos and delivery workflows without sending raw source to Clyra by default.
Does this replace secret scanning?
No. Secret scanning finds exposed secrets. Clyra asks a different question: which AI-assisted
workflow can use a credential or token to take an action against a repo, CI/CD system, cloud path,
tool, or release workflow?
Does this block developers?
The first product is visibility and assessment, not developer blocking. It helps security and
platform teams decide which paths should be allowed, approved, changed, or later controlled.
What if we only use Cursor, Claude Code, Codex, or Copilot locally?
Local coding assistants still change the software delivery surface when their output reaches PRs,
scripts, CI jobs, MCP configs, credentials, or release paths. Clyra focuses on those delivery
artifacts and action paths.
What if we do not use MCP yet?
MCP is only one signal. Clyra also looks at CI workflows, package scripts, agent instructions,
repo automation, credential references, GitHub Actions, cloud commands, and release-adjacent paths.
What is an Agent Action BOM?
An Agent Action BOM is a buyer-readable artifact that explains which agent or workflow is acting,
where it was introduced, which declared tools or systems it can reach, what credential or identity it uses,
what actions are reachable, and what owner, approval, policy, or evidence gaps exist.
How is Clyra different from NHI, IAM, PAM, or agent gateway tools?
NHI, IAM, and PAM tools tell teams which identities and credentials exist. Runtime gateways decide
whether traffic or tool calls should be allowed now. Clyra maps the upstream software delivery
action-control graph: where the path came from, what authority it carries, what it can affect,
and whether approval or evidence exists.
Do we need this if we do not have an internal agent registry yet?
Often, yes. Clyra helps map AI-assisted delivery paths before they become
normal infrastructure, so teams know what should be registered, approved, governed, or later enforced.
Who is the first assessment for?
It is for security engineering, AppSec, platform security, DevSecOps, developer productivity,
and engineering leaders at software companies already allowing AI-assisted workflows into PRs,
CI/CD, tools, credentials, or cloud paths.