Drako scans your codebase entirely offline using AST-based static analysis. No account, no API key, and no network connection required for scanning.
Run your first scan
Navigate to your AI agent project and run:Drako analyzes your project’s Python files using AST-based static analysis and prints a report:
Review your findings
Every scan produces two scores and a ranked finding list.Governance score — answers the security question: are your agents safe to run in production? It covers hardcoded secrets, prompt injection risks, missing audit logging, absent human-in-the-loop controls, and more.Determinism score — answers the engineering question: will your agents behave the same way twice? It flags missing temperature settings, absent timeouts, no retry limits, and other sources of non-deterministic behavior.Grades run from A (90–100) down to F (0–39). Each project starts at 100 and loses points per finding, with caps per rule category so a single misconfiguration cannot zero out your score.Reachability separates real risks from theoretical ones. A finding marked
⚠ REACHABLE means the dangerous code path is actively used by at least one agent. A finding marked ○ UNREACHABLE means no agent currently references that tool or code path — it is dimmed in the output, not removed, so you remain aware of it.Generate a config
Once you have reviewed your findings, generate a This produces a By default,
.drako.yaml config pre-filled with your project’s agents, tools, and recommended policies:.drako.yaml in your project root:drako init uses autopilot mode: it reads your scan results, generates the config, and starts in audit mode so nothing is blocked yet. When you are ready to enforce, run drako upgrade --balanced.Add runtime enforcement
To enforce your policies at runtime, wrap your agent with
govern:govern auto-detects the framework (CrewAI, LangGraph, AutoGen) from the object you pass in. Every tool call then passes through a 13-stage pipeline — DLP scanning, ODD boundary checks, circuit breakers, HITL triggers, spend caps, and more — before it executes.Next steps
Scanning overview
Understand the full scan pipeline, all 97 rules, and how reachability analysis works.
Runtime enforcement
Learn about the 13-stage enforcement pipeline and all 20 runtime capabilities.
Configuration reference
Full reference for every field in
.drako.yaml, policy templates, and autopilot modes.CLI reference
Every flag and option for
drako scan, including SARIF output, CI gates, and diff mode.