Your AI works for you. Who watches your AI?

Kefal gives your infrastructure architectural awareness. It knows what's running, what's exposed, and what doesn't belong — before an attacker does.

Installs in 33 seconds No config files No vendor lock-in

Why now

The attack surface you didn't mean to open.

April 2026. Claude Mythos became the first AI to complete a 32-step network attack autonomously. 73% success rate on expert-level CTFs. It's not a lab demo — it's what's coming for your stack.

If you've added AI to your business — a RAG layer on client documents, a coding assistant for your dev team, an AI diagnostic agent for your clinic — you've opened paths that traditional security tools can't see. Signatures don't catch what has no signature yet.

450,000 small and mid-sized businesses that have deployed AI in the last 18 months — without a CISO, a SOC, or a CrowdStrike budget to match.

That's what Kefal is for.

How it works

Three steps. Sixty seconds to first value.

01

Create your account

10 seconds

Sign up at kefal.dev/app with your email. No credit card. 7-day free trial — full feature access from minute one.

Create free account

02

Generate your API key

5 seconds

In your dashboard, open Settings → API Keys → Generate. Copy the kfl_… key — it's shown once and then only its hash is kept on our servers.

API key kfl_••••••••••••••••••••••••••••••••
03

Install the agent

30 seconds

Download the static binary on the server you want to monitor, run it, paste your API key when prompted. That's it.

curl -L -o kefal-agent \
  https://kefal.dev/download/kefal-agent-linux-amd64
chmod +x kefal-agent
sudo ./kefal-agent

macOS, ARM64 and Windows binaries available — see install docs.

The product

What an aware infrastructure looks like.

Two views, same data. Graph for the architect's eye. Incidents for the on-call engineer. Remediation written in plain English — and in the exact shell command you'd run.

kefal.dev/app · Graph view
Graph List Incidents •3
web-01 db-01 ai-01 nginx sshd redis postgres ollama waf cert cache pg-auth alice :443 :5432 :22
Live architectural graph. Every host, service, port, and identity — and what they don't have permission to reach.
kefal.dev/app · Incidents
Graph List Incidents
HIGH service_privilege_exposure web-01 · postgres:5432 2m ago
CRITICAL exposed_database db-01 · postgres:5432 47s ago · first observed

Why this fired. A postgres service is listening on 0.0.0.0:5432 instead of 127.0.0.1. The database is reachable from the public network.

Remediation 3 actions · generated by compositional engine · apply in order

  1. 1Bind postgres to localhostlow risk
    sudo sed -i "s/^#*listen_addresses.*/listen_addresses = '127.0.0.1'/" \
      /etc/postgresql/*/main/postgresql.conf
    sudo systemctl restart postgresql
  2. 2Verify no external connections remainlow risk
    ss -tlnp | grep 5432
    # expect: 127.0.0.1:5432 only
  3. 3Block port 5432 at firewallmoderate risk
    sudo ufw deny 5432/tcp
    sudo ufw reload
MEDIUM novel_outbound_connection ai-01 · ollama → 185.x.x.x 11m ago
Every incident comes with a remediation plan. Three concrete actions, risk-labeled, with the exact commands.
Under the hood

Kefal doesn't just check rules. It reasons about your infrastructure.

Seven compositional engines run on every scan. The same architecture that powers autonomous research — now applied to defending your network.

TransitionGraph

Learns the normal rhythm of your infrastructure and detects when behavior shifts.

IdeaGraph

Maps relationships between every process, port, and identity. Surfaces hidden paths.

WorldModel

Maintains a persistent model of what your system should look like. Notices what drifts.

EpistemicProfiler

Tracks what your infrastructure knows and how that knowledge evolves over time.

IntuitivePredictor

Anticipates what an attacker would try next based on your current exposure.

HebbianGraph

Strengthens trust in common patterns. Isolates the ones that don't fit.

SDE — Strategic Decomposition Engine

Breaks multi-step attacks into the causal chain you can actually act on.

This isn't a rule engine with a fancy UI. It's the same compositional primitive that powers autonomous research in the Catalyst lab — applied to defending your network.

Connect with AI

Talk to your servers. In any agent.

Kefal speaks two protocols designed for AI: MCP for inline tool-use from chat-style assistants, and A2A for autonomous agents that need to delegate security checks.

MCP

Talk to your servers

Connect Kefal to Claude, Cursor, or any MCP-compatible AI assistant. Ask about your servers in natural language.

{
  "mcpServers": {
    "kefal": {
      "url": "https://kefal.dev/mcp/",
      "headers": {
        "Authorization": "Bearer kfl_your_key"
      }
    }
  }
}

6 tools available

  • list_agents — enrolled hosts
  • get_agent_status — latest snapshot
  • list_incidents — filter by status / severity
  • get_incident — full record + causal chain
  • acknowledge_incident — mark as seen
  • get_topology — graph of nodes & edges
A2A

Agent-to-Agent

Kefal is discoverable as an autonomous security agent via Google's A2A protocol. Your DevOps agents can delegate security checks before deployments — no human in the loop.

Discovery

GET https://kefal.dev/.well-known/agent.json

Send a task

POST https://kefal.dev/a2a
Authorization: Bearer kfl_your_key
{
  "jsonrpc": "2.0",
  "id": "1",
  "method": "a2a.task.send",
  "params": {
    "task_id": "pre-deploy-check",
    "message": {
      "role": "user",
      "content": "list open incidents"
    }
  }
}

Cross-agent example

"Before merging, my CI agent asks Kefal for any open high-severity incident on the deploy target. If anything's open, the merge is held until a human acknowledges."

Pricing

Simple plans. Price-honest for SMBs.

Starter

$49/mo

For a single server or small office setup.

  • Up to 3 agents
  • 32 built-in invariants
  • Graph / List / Incidents views
  • AI-generated remediations
Start 7-day trial

Enterprise

$399/mo

When you need SLA, dedicated support, and unlimited scale.

  • Unlimited agents
  • Everything in Professional
  • SLA + priority support
  • Direct line to engineering
Contact us

All plans include a 7-day free trial. No credit card required. Cancel anytime.

Frequently asked

The five questions every CEO asks first.

What data does the agent collect?

Hostnames, running processes, listening ports, and logged-in usernames. No file contents, no network payloads, no keystrokes, no disk contents. The agent is ~6 MB, statically linked, and sends one snapshot every 60 seconds over HTTPS.

Full schema in the documentation.

Is my data shared with other customers?

No. Your graph, incidents, and snapshots are tenant-isolated at every database query. No other customer can see your infrastructure.

What does cross tenants: the detection rules themselves. When a customer contributes a new invariant and it survives adversarial verification, every other customer gains the detection. You never share data — only defensive intelligence.

What happens after the free trial?

Nothing breaks. Your dashboard, graph, and incident history stay visible. Ingest pauses until you subscribe — your agents keep trying and resume automatically once your plan is active. No data deletion. No surprise charges.

Can I monitor multiple servers?

Yes. Install the agent on each server with the same credentials — each appears as a distinct host in your graph. Plan limits: 3 agents on Starter, 15 on Professional, unlimited on Enterprise.

Do I need technical knowledge to use Kefal?

Sign up in 10 seconds, generate an API key from the dashboard, then run one curl command on each server. The dashboard is visual — graph view by default, no queries to write. Remediations come with exact commands, labeled by risk. If you can follow copy-paste instructions, you can run Kefal.

More answers in the full FAQ.

Your AI doesn't sleep. Neither should your defense.

Start monitoring your infrastructure today. It takes less time than reading this page.

Start your free trial →

7-day trial. No credit card. Cancel anytime.