NEW Β· Admin MCP server β AI agents can now manage hoop, audited like humans. Read more β
hoop.dev is a layer 7 gateway that masks sensitive data, blocks dangerous commands, approves risky writes, and records every session inline, before anything reaches your infrastructure.
Engineers Β· AI Agents Β· MCP Clients Β· Services Β· Support/QA
Open-source. Used by NYSE-listed companies. 5,000+ databases protected.
Quick start Β· How it works Β· Connectors Β· vs alternatives Β· What's new Β· Docs
hoop is an open-source layer 7 gateway that sits between users (engineers, AI agents, service accounts) and infrastructure (databases, Kubernetes clusters, servers, APIs). Every query and command passes through at the wire protocol level, where the gateway can:
- Mask sensitive data in responses β ML-powered classification, not regex pattern matching, applied before bytes leave the gateway.
- Block dangerous commands before they execute β
DROP TABLE,rm -rf,DELETEwithoutWHERE, configurable per role and per backend. - Require human approval for risky operations β Slack or Teams workflow, time-bound, fully logged.
- Record every session β full replay of SQL, shell, kubectl, and HTTP traffic, indexed by user, table, and query. No agents on endpoints. No schema discovery. No code changes. Deploy the gateway, connect your identity provider, define your rules.
Teams where engineers or AI agents access production infrastructure. If your developers run queries against databases with customer PII, execute commands on production Kubernetes clusters, or use AI coding assistants against real systems, hoop gives you visibility and control over what happens inside those sessions and what data is allowed to leave them.
An engineer pulls recent payments to investigate a customer report:
β Without hoop
SELECT * FROM payments LIMIT 10; id | customer_email | card_number | amount | status
-------+-------------------------+----------------------+--------+----------
84021 | jane.thompson@gmail.com | 4532-1024-5678-9012 | 49.99 | settled
84022 | mreyes@acmecorp.io | 5412-7510-3344-1182 | 120.00 | settled
84023 | k.patel@protonmail.com | 4716-9923-1144-5577 | 24.99 | refunded
84024 | dlin@northwind.co | 5577-3344-9911-2266 | 89.50 | settled
84025 | tyler.s@gmail.com | 4111-2222-3333-4444 | 15.00 | failed
...
10 rows of real card numbers and emails. Now in psql history, in the screenshot the engineer pasted into Slack, and in the CSV they exported to debug locally.
β With hoop
SELECT * FROM payments LIMIT 10; id | customer_email | card_number | amount | status
-------+-----------------------+---------------------+--------+----------
84021 | j****@*****.com | **-**-****-9012 | 49.99 | settled
84022 | m****@*******.io | **-**-****-1182 | 120.00 | settled
84023 | k****@*********.com | **-**-****-5577 | 24.99 | refunded
84024 | d****@*********.co | **-**-****-2266 | 89.50 | settled
84025 | t****@*****.com | **-**-****-4444 | 15.00 | failed
...
Engineers can still debug using amounts, statuses, and timestamps. PII never leaves the gateway.
An AI agent fixing a bug at 3AM:
β Without hoop
> claude-code: DROP TABLE orders; Query OK 47,291,834 rows affected π
β With hoop
> claude-code: DROP TABLE orders; β Blocked by guardrail: "Prevent destructive DDL in production" Event logged. Security team notified.
The command never reached the database.
# create a jwt secret for auth
echo "JWT_SECRET_KEY=$(openssl rand -hex 32)" >> .env
# download and run
curl -sL https://hoop.dev/docker-compose.yml > docker-compose.yml && \
docker compose upGateway running on :8009. OIDC connected. Masking and guardrails active.
Engineers / AI Agents / Service Accounts
β
βΌ
ββββββββββββββββββ
β hoop Gateway β β Parses wire protocols in real time
β β
β β’ Masks PII β (ML-powered, <5ms latency)
β β’ Blocks cmds β (DROP, DELETE, rm -rf)
β β’ Approvals β (Slack / Teams)
β β’ Records all β (full session replay)
β β’ AI controls β (per-action governance)
ββββββββββββββββββ
β
βΌ
Your Infrastructure
(Databases, K8s, SSH, APIs, MCP servers)
The gateway parses wire protocols natively: PostgreSQL, MySQL, MSSQL, MongoDB, Kubernetes, SSH, HTTP/gRPC, RDP, and more. Your tools connect through the gateway without knowing it's there. No SDKs, no plugins, no browser extensions.
What hoop does in real-time on every connection β for engineers, AI agents, and service accounts equally.
Data masking
-
ML-powered detection of PII, PHI, PCI data, and credentials inside database responses, API payloads, and terminal output. Not regex. The model understands context:
555-1234in aphonecolumn is a phone number,BUILD-555-1234in a CI log is a build ID. One rule covers thousands of resources. No schema mapping required. Guardrails -
Define dangerous operations and block them at the protocol layer before they reach the target system.
DROP TABLE,DELETEwithoutWHERE,kubectl delete namespace,rm -rf, and any custom pattern. Prevention, not detection. Command approval -
Route risky operations (production writes, schema changes, config mutations) for human approval via Slack or Teams. One command, one decision. The operation waits until approved, denied, or scheduled for a maintenance window. SSO
-
Connect Okta, JumpCloud, Azure AD, Google Workspace, or any OIDC/SAML provider. Included in the open-source license with no separate tier or seat charge. Identity is a security primitive, not a revenue lever.
Same policy engine, agent-aware semantics. No parallel stack, no sandbox.
AI agent governance
-
Claude Code, Cursor, and autonomous agents connect to your infrastructure through the gateway. Agents read freely (with masked responses). Agents write with approval. Destructive operations are blocked outright. Every agent action is logged, risk-scored, and replayable. MCP gateway
-
Not just a proxy. hoop inspects MCP payloads, masks PII in JSON responses before they reach the agent, blocks dangerous operations, and federates identity so developers never touch real credentials. Auto-generates a sensitive data catalog from MCP traffic.
What you stop building yourself once hoop is in place.
Session recording
-
Full session capture with replay. Every command, every response, every approval and denial. Generates compliance evidence for SOC 2, GDPR, PCI DSS, and HIPAA automatically. Runbooks
-
Parameterized templates stored in Git. Your team executes common operations with validated inputs. Guardrails, masking, and approval workflows apply automatically to every run.
hoop gets compared to three different categories of tools. Here's where it overlaps and where it doesn't.
PAM tools route the connection, broker credentials, and log the session. hoop does that too β and then parses the wire protocol on top. Once a user is connected, PAM is done; hoop is just starting. We mask sensitive fields in database responses, block destructive commands by content (DROP TABLE, rm -rf), and require approval on risky writes β all inline, before the action reaches the target system.
If your concern is who connected, PAM is enough. If your concern is what data left the session and what commands ran, you need both β or you need hoop.
DLP inspects data in motion at the network or endpoint layer β usually after a developer has already pulled it onto their laptop, into a Slack message, or into an email. hoop inspects data in motion at the wire-protocol layer β before it reaches the developer at all. Sensitive fields never leave the gateway in the first place.
DLP catches leaks. hoop prevents them.
AI security tools sit in front of the LLM. They inspect prompts going in and outputs coming out, looking for jailbreaks, prompt injection, and policy violations at the application layer. hoop sits in front of the infrastructure. We inspect what data the agent is allowed to read, what commands it's allowed to run, and what gets returned β at the database, Kubernetes, and MCP layers.
Different problem. Different layer. Most regulated AI deployments end up with both β application-layer controls on the prompt, infrastructure-layer controls on the data.
touch .env && \
curl -sL https://hoop.dev/docker-compose.yml > docker-compose.yml && \
docker compose upSee Docker Compose documentation β
See Kubernetes deployment documentation β
See AWS deploy & host documentation β
| Category | Protocols |
|---|---|
| Databases | PostgreSQL, MySQL, MSSQL, MongoDB |
| Infrastructure | Kubernetes (exec, port-forward), SSH, RDP |
| APIs | HTTP, gRPC |
| AI | Claude Code, Cursor, MCP servers |
| Runtimes | Rails, Django, Elixir IEx, PHP |
| Cloud | AWS SSM, custom CLIs |
AI agents can now manage hoop itself. Connect Claude Code, Cursor, or any MCP-compatible client and the agent can configure connections, guardrails, data masking, and reviews β the same surface a human admin uses.
Every agent action flows through the same auth, audit log, and policy enforcement as a human admin. Approvals route to Slack or Teams. Destructive operations are blocked at the protocol layer. Sessions are recorded and replayable.
hoop now governs the agents that govern hoop.
We welcome contributions. Protocol parsers, masking patterns, guardrail rules, runbook templates, integrations, and documentation improvements. Check out our Development Documentation to get started.
Join our Discussions to ask questions, share ideas, and connect with other users.
If hoop solves a problem for you, give us a star. It helps other teams find the project and tells us what to invest in next.
MIT. The code that touches your data is code you can read.
hoop.dev Β· Data security in transit. One gateway, every protocol.