KulaShield logo KulaShield MCP Book Demo
AI Agent Threat Detection Platform

Get rogue AI agents
under control

KulaShield MCP detects hidden agents, rogue MCP servers, suspicious permission chains and potential corporate data exfiltration.

Rogue MCP Shadow AI Permission Chains Data Exfiltration

Product / How it Works

KulaShield MCP gives security teams visibility into AI agents, MCP endpoints, tool permissions and abnormal behavior across enterprise environments.

1. DiscoverScan MCP endpoints, AI tools, agent workflows and connected services.
2. MapBuild permission chains between agents, users, tools and sensitive data.
3. AnalyzeUse behavioral analysis to detect unusual access, tool calls and movement patterns.
4. AlertGenerate security alerts for rogue servers, risky chains and exfiltration indicators.
5. RemediateGuide teams toward access removal, isolation and policy enforcement.
KulaShield MCP Dashboard Mockup Status: Monitoring

Live Detection Map

Rogue MCP server detected: unknown endpoint connected to Gmail + Notion workspace.
Suspicious permission chain: AI agent → internal docs → export tool → external destination.
Behavioral anomaly: unusual high-volume document access outside normal business pattern.

Risk Summary

Critical: 2

High: 6

Medium: 14

False positive review: pending validation

Demo / Proof of Concept

Current demo concept: a controlled environment showing discovery of rogue MCP servers, hidden AI agents and suspicious permission chains.

Live Demo

Interactive walkthrough of detection logic, alert generation and investigation flow.

2-3 Minute Video

Short product video showing dashboard, alerts and example investigation path.

Test Scenario

Example: rogue MCP server gains access to Gmail, Notion and internal documents.

POC Output

Clear report with discovered endpoints, risks, permission chains and suggested remediation.

Traction / Validation

Placeholder validation section for beta users, pilots, Letters of Intent and technical testing metrics.

2Target pilot environments
15+Example MCP endpoints in test scope
TBDFalse positive rate after beta

Founder / Team

Founder of KulaShield MCP with operational background in physical security, cybersecurity operations, crisis response and critical infrastructure protection.


Former Police Criminal Division officer and Regional Security Manager within Google security operations across Poland.


Experience includes enterprise security environments, compliance operations, incident response, operational continuity and AI-driven security automation.


Currently Head of Operations at TomFit AG, focused on AI/LLM implementation, risk management and secure enterprise automation.


Security-cleared professional with experience in high-security government and international operational environments.

Pricing

Enterprise security product for organizations adopting AI agents, MCP servers and LLM-based automation.

Enterprise

Custom deployment, pilot evaluation, dashboard access, security review and detection roadmap.


Contact us: krystiankula@gmail.com

Blog / Resources

Resource example for investors and security teams evaluating AI agent risk.

Article

Why MCP Security Matters

MCP servers can connect AI agents to powerful enterprise tools. Without visibility, organizations may lose control over tool access, data movement and agent behavior.

Threat

Rogue MCP servers may expose sensitive tools to unauthorized agents.

Risk

Permission chains can allow indirect access to email, documents, CRM systems or internal knowledge bases.

Solution

Continuous discovery, behavioral analysis and alerting help security teams regain control.

Contact / Book Demo

Request access, discuss a pilot or ask for the KulaShield MCP demo.