eBPF-based runtime security for AI inference workloads
Finds AI serving processes by name/cmdline. Auto-attaches eBPF probes on discovery.
Consumes ring buffer. Parses and enriches events with PID, container ID, timestamp.
Compares events against loaded profile. Flags deviations above threshold.
Writes block decisions to eBPF map. LSM hook reads map synchronously to deny syscall.
Structured JSON to stdout, file, or syslog. Plug into any SIEM (Splunk, Elastic, Datadog).