npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

@opena2a/arp

v0.1.1

Published

Agent Runtime Protection — LLM-assisted behavioral monitoring, anomaly detection, and enforcement for AI agents.

Readme

OpenA2A: AIM · HackMyAgent · OASB · ARP · Secretless · DVAA

ARP — Agent Runtime Protection

License: Apache-2.0 Tests OASB

Detect. Intercept. Enforce.

Runtime security monitoring for AI agents. Detects process spawns, network connections, and filesystem access in real-time — with zero-latency application-level interception that fires before the I/O happens.

OpenA2A | OASB Benchmark | MITRE ATLAS Mapping


Table of Contents


Quick Start

npm install @opena2a/arp

As SDK

import { AgentRuntimeProtection } from '@opena2a/arp';

const arp = new AgentRuntimeProtection({
  agentName: 'my-agent',
  monitors: {
    process: { enabled: true },
    network: { enabled: true, allowedHosts: ['api.example.com'] },
    filesystem: { enabled: true, watchPaths: ['/app/data'] },
  },
  interceptors: {
    process: { enabled: true },
    network: { enabled: true },
    filesystem: { enabled: true },
  },
});

arp.onEvent((event) => {
  if (event.category === 'violation') {
    console.warn(`[ARP] ${event.severity}: ${event.description}`);
  }
});

await arp.start();
// ... your agent runs ...
await arp.stop();

As CLI

npx arp-guard start                    # Start with auto-detected config
npx arp-guard start --config arp.yaml  # Start with custom config
npx arp-guard status                   # Show monitor status and budget
npx arp-guard tail 20                  # Show last 20 events
npx arp-guard budget                   # Show LLM spending

Architecture

ARP uses two complementary detection layers plus a 3-layer intelligence stack.

Detection Layers

| Layer | Mechanism | Latency | Coverage | |-------|-----------|---------|----------| | OS-Level Monitors | Polling (ps, lsof, fs.watch) | 200–1000ms | Catches everything on the system | | Application Interceptors | Node.js module hooks | <1ms | Fires before I/O, 100% accuracy |

| Monitor | What It Detects | |---------|-----------------| | ProcessMonitor | Child process tracking, suspicious binary detection, CPU monitoring | | NetworkMonitor | Outbound connections with fallback chain: lsofss/proc/net/tcpnetstat | | FilesystemMonitor | Sensitive path access via recursive fs.watch |

| Interceptor | Hooks | What It Catches | |-------------|-------|-----------------| | ProcessInterceptor | child_process.spawn/exec/execFile/fork | All child process creation | | NetworkInterceptor | net.Socket.prototype.connect | All outbound TCP connections | | FilesystemInterceptor | fs.readFile/writeFile/mkdir/unlink | All filesystem I/O |

Interceptors fire before the operation executes. No kernel dependency required.

Intelligence Stack

| Layer | Method | Cost | When | |-------|--------|------|------| | L0 | Rule-based classification | Free | Every event | | L1 | Z-score anomaly detection | Free | Flagged events | | L2 | LLM-assisted assessment | Budget-controlled | Escalated events |

L2 supports Anthropic, OpenAI, and Ollama adapters with per-hour call limits and USD budget caps.

Enforcement Actions

log → alert → pause (SIGSTOP) → kill (SIGTERM/SIGKILL)

Each action is configurable per-rule with optional LLM confirmation before enforcement.


Configuration

ARP auto-discovers config files: arp.yamlarp.ymlarp.json.opena2a/arp.yaml

agentName: my-agent
agentDescription: Production agent with restricted capabilities
declaredCapabilities:
  - file read/write
  - HTTP requests

monitors:
  process:
    enabled: true
    intervalMs: 5000
  network:
    enabled: true
    intervalMs: 10000
    allowedHosts:
      - api.example.com
      - cdn.example.com
  filesystem:
    enabled: true
    watchPaths:
      - /app/data
    allowedPaths:
      - /app/data
      - /tmp

interceptors:
  process:
    enabled: true
  network:
    enabled: true
    allowedHosts:
      - api.example.com
  filesystem:
    enabled: true
    allowedPaths:
      - /app/data

rules:
  - name: critical-threat
    condition:
      category: threat
      minSeverity: critical
    action: kill
    requireLlmConfirmation: true

  - name: high-violation
    condition:
      category: violation
      minSeverity: high
    action: alert

intelligence:
  enabled: true
  adapter: anthropic
  budgetUsd: 5.0
  maxCallsPerHour: 20
  minSeverityForLlm: medium

Detection Coverage

curl, wget, nc, ncat, nmap, ssh, scp, python, perl, ruby, base64, socat, telnet, ftp, rsync

webhook.site, requestbin, ngrok.io, pipedream.net, hookbin.com, burpcollaborator, interact.sh, oastify.com, pastebin.com, transfer.sh

.ssh, .aws, .gnupg, .kube, .config/gcloud, .docker/config.json, .npmrc, .pypirc, .git-credentials, wallet.json, .bashrc, .zshrc, .bash_profile, .profile, .gitconfig, .env, .netrc, .pgpass


Event Model

interface ARPEvent {
  id: string;
  timestamp: string;
  source: 'process' | 'network' | 'filesystem';
  category: 'normal' | 'anomaly' | 'violation' | 'threat';
  severity: 'info' | 'low' | 'medium' | 'high' | 'critical';
  description: string;
  data: Record<string, unknown>;
  classifiedBy: 'L0-rules' | 'L1-statistical' | 'L2-llm';
}

MITRE ATLAS Mapping

| Technique | ID | Detection | |-----------|----|-----------| | Unsafe ML Inference | AML.T0046 | Process spawn/exec monitoring | | Data Leakage | AML.T0057 | Sensitive path + suspicious host detection | | Exfiltration | AML.T0024 | Outbound connection tracking | | Persistence | AML.T0018 | Shell config dotfile write detection | | Denial of Service | AML.T0029 | CPU monitoring, budget exhaustion | | Evasion | AML.T0015 | L1 anomaly baseline detection | | Jailbreak | AML.T0054 | L2 LLM consistency assessment |


Testing

npm test          # 18 unit tests
npm run build     # TypeScript compilation

For comprehensive security testing, see OASB — 182 attack scenarios across 42 test files mapped to MITRE ATLAS.


License

Apache-2.0


OpenA2A Ecosystem

| Project | Description | Install | |---------|-------------|---------| | AIM | Agent Identity Management -- identity and access control for AI agents | pip install aim-sdk | | HackMyAgent | Security scanner -- 147 checks, attack mode, auto-fix | npx hackmyagent secure | | OASB | Open Agent Security Benchmark -- 182 attack scenarios | npm install @opena2a/oasb | | ARP | Agent Runtime Protection -- process, network, filesystem monitoring | npm install @opena2a/arp | | Secretless AI | Keep credentials out of AI context windows | npx secretless-ai init | | DVAA | Damn Vulnerable AI Agent -- security training and red-teaming | docker pull opena2a/dvaa |