ShieldOps / Protect / Exposure Management
All systems nominal
3 alerts
Security Manager
JR
1,247
Unnecessary Access Paths Restricted This Week
silently, without developer intervention
47
Apps Under Zero Trust File Control
operating within defined boundaries
0
Developer Tickets Generated
frictionless for your engineering team
Layer 1
Sensitive Path Protection
Category-based rules that silently restrict access to sensitive OS and application data
Layer 2
Zero Trust File Control
Per-app restrictions — each app operates within its minimum required file access surface
After a learning period, apps can only access files they genuinely need.
1P
1Password
Learning: Complete
Allowed paths: 3
Last outside attempt: Never
Credential store access only
VS
VS Code AWS Toolkit
Learning: Complete
Allowed paths: 7
Last outside attempt: 4 days ago
~/.aws/ and workspace only
PM
Postman
Learning: Complete
Allowed paths: 4
Last outside attempt: Never
~/Postman/ and project dirs only
GH
GitHub CLI
Learning: Complete
Allowed paths: 5
2 days ago (policy exception)
~/.ssh/ (read-only) and git repos only
FG
Figma
Learning: Complete
Allowed paths: 3
Last outside attempt: Never
~/Documents/Figma/ only
SL
Slack
Learning: Complete
Allowed paths: 6
Last outside attempt: Never
~/Library/Application Support/Slack/ only
PY
pyenv / Python
In Progress
Learning: 5 days remaining 75%
Allowed paths: Learning...
Last outside attempt: N/A
TBD after learning period
Weekly Impact
Access attempts restricted by ShieldOps — 30 days
What We're Protecting
Restrictions by category this week
Fleet Coverage
Protection deployment status
Apps under Zero Trust control 47 of 247 (19%)
Endpoints with active protection 231 of 247 (94%)
Top Impact This Week
Apps whose unrestricted access was most reduced
1
cursor-agent-v0.4.2
🔑
847
restrictions
2
npm: lightllm
🔑🌐
203
restrictions
3
Homebrew 4.2.1
💾
130
restrictions
4
Docker Desktop
🌐💾
67
restrictions
5
pyenv/python3
💾
42
restrictions