Skip to main content
ShieldCortex/Iron Dome

Iron Dome

The behavioural security layer for AI agents. Six defensive layers that intercept, analyse, and gate every instruction before your agent acts on it.

Free & open source·Part of ShieldCortex

6
Defence Layers
4
Security Profiles
<1ms
Per Check
0
Dependencies

One Command. Full Protection.

Activate Iron Dome and watch six defence layers come online

terminal
$ shieldcortex iron-dome activate --profile enterprise
Iron Dome activating...
Layer 1: Instruction Gateway — armed
Layer 2: Injection Scanner — armed
Layer 3: Action Gating — armed
Layer 4: PII Protection — armed
Layer 5: Kill Switch — armed
Layer 6: Audit Trail — armed
Iron Dome online — enterprise profile active
6/6 layers active · 0 threats intercepted · agent secured
Defence Architecture

Six Layers of Defence

Every instruction passes through six checkpoints before your agent acts on it

LAYER 1

Instruction Gateway

Validates and normalises every instruction before it enters the pipeline. Blocks malformed commands, enforces schema rules, and rejects instructions from untrusted sources.

LAYER 2

Injection Scanner

Multi-pattern detection for prompt injection, jailbreak attempts, and instruction smuggling. Catches hidden payloads, Unicode tricks, and fragmented attacks across messages.

LAYER 3

Action Gating

Controls what actions an agent can take. Allowlists, denylists, and scope boundaries per profile. High-risk actions require explicit approval or are blocked outright.

LAYER 4

PII Protection

Detects and redacts personally identifiable information before it reaches memory or external systems. Names, emails, phone numbers, addresses, and national IDs — caught and masked.

LAYER 5

Kill Switch

Instant shutdown when threat thresholds are breached. Halts all agent operations, preserves state for forensic review, and sends alerts. No graceful degradation — full stop.

LAYER 6

Audit Trail

Every instruction, decision, and action is logged with timestamps, source identity, and outcome. Tamper-resistant, queryable, and ready for compliance exports.

Pre-Built Profiles

Four Security Profiles

Choose a profile that matches your threat model. Every profile activates all six layers — the difference is how aggressively they respond.

School

Child safety first
  • Strict content filtering
  • Full PII redaction
  • No external API calls
  • Audit everything
Recommended

Enterprise

Production hardened
  • Injection scanning (strict)
  • Action allowlists
  • PII redaction + alerting
  • Kill switch at threshold

Personal

Balanced protection
  • Injection scanning (balanced)
  • PII detection + warning
  • Flexible action gating
  • Lightweight audit log

Paranoid

Maximum lockdown
  • Block-first, allow-second
  • All actions require approval
  • Zero tolerance on PII
  • Verbose audit + alerts

--profile school  | --profile enterprise  | --profile personal  | --profile paranoid

Pipeline Flow

How It Works

Iron Dome wraps your agent's instruction pipeline. Every instruction enters, gets checked, and only clean instructions reach your agent's logic.

1

Instruction arrives

From user prompt, sub-agent, tool result, or external webhook — Iron Dome intercepts it.

2

Six-layer scan

The instruction passes through all six layers in sequence. Each layer can allow, flag, quarantine, or block.

3

Decision

Clean instructions pass through. Suspicious ones get quarantined for review. Malicious ones are blocked and logged.

Agent acts safely

Your agent only sees instructions that passed all six layers. Everything else is logged in the audit trail.

Full Stack Security

Part of ShieldCortex

Iron Dome is ShieldCortex's behavioural layer. Together, they protect both what your agent remembers and what it does.

ShieldCortex Memory

Protects what your agent stores. Persistent memory, semantic search, trust scoring, sensitivity classification, memory firewall.

Learn more about ShieldCortex →

Iron Dome Behaviour

Protects what your agent does. Instruction gateway, injection scanning, action gating, PII protection, kill switch, audit trail.

You are here

Works With Your Stack

Drop-in behavioural security for the tools you already use

OpenClawClaude CodeCursorVS CodeMIT LicenceFree & Open Source

Secure Your Agent's Behaviour

Six layers of defence. One npm install. Free and open source.