opena2a detect
Shadow AI Discovery. Find unmanaged AI agents and MCP servers running in your environment.
Usage
opena2a detect [options]The Shadow AI Problem
Shadow AI is the use of AI agents, MCP servers, and coding assistants without organizational visibility or governance. Developers adopt these tools faster than security teams can track them. The result: unmanaged agents with access to source code, credentials, and infrastructure -- operating outside identity management, access controls, and audit logging.
opena2a detect scans the local machine for running AI agents and MCP server configurations, then reports their identity and governance status. It answers the question every security team needs answered: what AI tools are active, and are they governed?
What It Detects
Running AI Agents
Scans the process list for known AI coding tools:
| Agent | Detection Method |
|---|---|
| Claude Code | Process name matching (claude, @anthropic-ai/claude-code) |
| Cursor | Process name matching (cursor, Cursor.app) |
| GitHub Copilot | Process name matching (copilot) |
| Windsurf | Process name matching (windsurf, Windsurf) |
| Aider | Process name matching (aider) |
| Continue | Process name matching (continue) |
| Cline | Process name matching (cline) |
MCP Server Configurations
Discovers MCP server configs from standard locations:
~/.claude/mcp_servers.json(Claude Code)~/.cursor/mcp.json(Cursor)~/.config/windsurf/mcp.json(Windsurf)~/.vscode/extensions/*/mcp.json(VSCode extensions)mcp.json/.mcp.json(project-local)
Identity Status
Checks for AIM governance artifacts in the target directory:
- AIM project initialization (
.opena2a/directory) - MCP server identities (
.opena2a/mcp-identities/) - SOUL.md governance files
- Capability policy files (
policy.yml,policy.yaml,policy.json)
Options
| Flag | Description |
|---|---|
--dir <path> | Target directory to scan. Default: current working directory. |
--format <text|json> | Output format. |
--ci | CI mode. Non-interactive output. |
--verbose | Show detection methods and target directory. |
Examples
opena2a detectopena2a detect --dir ./my-agent-projectopena2a detect --ci --format jsonNext Steps
The detect command shows suggested next steps based on your findings:
opena2a identity create --name my-agentopena2a initopena2a mcp sign my-server