Stop AI agents
from going rogue before
they hit production.
Scan the capabilities, boundaries, and trust chains of your AI agents โ before they ship. Agentforce. ServiceNow. MuleSoft. MCP.
How it works
Point. Scan. Fix. Across every agentic platform.
Scan Agents Locally
Point SquireX at your ServiceNow Update Sets or Salesforce agent directory. It parses every agent, tool, and script โ then builds a semantic dependency graph of capabilities.
Map the Blast Radius
SquireX evaluates deterministic capability rules โ not an LLM โ to detect ACL bypasses, Role Masking failures, prompt poisoning, and capability leaks.
Seamless Remediation
SquireX integrates with GitHub Advanced Security and Copilot Autofix to block risky PRs and suggest secure boundaries automatically.
update-sets/acl_incident_read.xml โ ACL Script- var gr = new GlideRecord('sys_user_has_role');- gr.addQuery('user', gs.getUserID());- gr.query();- answer = gr.next();+ answer = gs.hasRole('admin'); // Fixed. Uses ACL-safe built-in API.
Your agents
reason.
Your scanner should too.
SquireX builds a semantic graph of every agent in your codebase โ mapping tools to scripts, prompts to data access, and capabilities to trust boundaries. It evaluates that graph against deterministic rules written for agentic reasoning, not static code paths.
One engine. Every agentic platform.
Same rule engine. Same SARIF output. Same CI/CD integration.
ServiceNow Now Assist
GlideRecord ACL bypasses, Role Masking failures, domain separation drift, latent memory poisoning, and MID Server trust violations.
Salesforce Agentforce
Capability leaks, prompt poisoning, topic boundary violations, and missing user confirmations in agent configurations.
MuleSoft Agent Fabric
PII routing violations, unauthenticated downstream LLM calls, and Flex Gateway privilege escalation chains.
MCP Servers
Tool ID spoofing, shadow servers, over-scoped OAuth tokens, and missing PKCE enforcement.
Agent Capability Rules
ServiceNow & Agentforce ExamplesDeterministic rules for agent reasoning. Click any rule to see the finding and the fix.
GlideRecord in ACL Script
Recursive access control bypass โ the ACL check itself bypasses access control.
Role Masking Not Configured
Dynamic User identity without Role Masking = unrestricted instance access.
Mandatory User Confirmation
Agent attempts high-privilege data modification without manual ACK.
// ACL Script โ incident table (ServiceNow) // โ GlideRecord in ACL = recursive bypass var gr = new GlideRecord('sys_user_has_role'); gr.addQuery('user', gs.getUserID()); gr.addQuery('role.name', 'admin'); gr.query(); answer = gr.next(); >> [CRITICAL] Rule 'SNOW-28.1 โ ACL Script Correctness' violated. Reason: GlideRecord in ACL creates a recursive bypass โ the access control check itself bypasses access control. Recommendation: Replace with gs.hasRole('admin').
What early users are saying
From the people who put agents in production every day.
We were deploying Now Assist agents without any security review on the GlideScript. SquireX flagged three GlideRecord calls in our ACL scripts that would have given the AI agent full table access. Fixed in an hour.
Finally something that treats AI agent security as a first-class concern, not an afterthought bolted on at the end. Dropped it into our GitHub Actions in under an hour.
Our ServiceNow instance is domain-separated across 40 subsidiaries. SquireX caught a missing sys_domain constraint in a Now Assist tool script that would have leaked cross-tenant incident data. That's a compliance nightmare avoided.
Works where you work
One scanner. Multiple surfaces. From your terminal to your CI/CD to your AI coding agent.
Parses Update Sets and sn_aia_* records to enforce ACL integrity, GlideRecordSecure usage, domain separation, and MID Server authentication for Now Assist AI agents.
Give Claude, Gemini, and Copilot direct access to every security rule. The first agent capability scanner to ship as an MCP server.
Inline PR annotations, automated merge blocking, and SARIF output that pipes directly into GitHub's code scanning dashboard.
Scans your agent skill documentation (README.md, SKILL.md, AGENTS.md) and IDE MCP configs for adversarial instructions invisible to human reviewers but visible to LLMs.
Convert every scan violation into a native DX test spec automatically. One command bridges code-time analysis and live Testing Center validation.
sf agent test runCommon questions
From teams using Salesforce Code Analyzer, ServiceNow ATF, or traditional SAST tools.
Those tools analyze code correctness โ variable patterns, API usage, test coverage. SquireX analyzes agent capabilities โ what can an agent do, what data can it access, and where are the trust boundaries broken? A GlideRecord in an ACL script is syntactically valid, passes ATF, and passes every linter. But it's a recursive access control bypass that gives an AI agent full table access. SquireX catches it because it understands the agentic context, not just the code.
Yes. SquireX v4 natively parses exported Update Set XML, sn_aia_agent and sn_aia_tool records, and GlideScript patterns. It ships with 29 SNOW-* rules covering tool configuration, script safety, Flow Designer, Virtual Agent, PII leakage, ACL integrity, domain separation, scope hygiene, MID Server trust, and more.
No โ it complements it. Keep running Salesforce Code Analyzer for your Apex code, or ServiceNow ATF for your GlideScript. Run SquireX specifically for your AI agents โ Agentforce, ServiceNow Now Assist, or MCP servers. SARIF 2.1.0 output means findings from all tools can be consolidated in GitHub Advanced Security or any compliant SIEM with zero extra configuration.
No org connection required. SquireX scans your local metadata files directly โ Salesforce .agent definitions, ServiceNow Update Set XML, GlideScript files, and MCP server configs. It's fully offline-capable.
No. The scanner runs locally on your machine or inside your CI/CD pipeline. Your metadata โ whether Salesforce agent files, ServiceNow Update Sets, or MCP server configs โ never leaves your environment. The GitHub App integration only reads file paths and violation locations โ it never transmits code content.
Up and running in 30 seconds
Free to use. No account needed for local scans.
Installation & Execution
npm install -g squirex
squirex scan --platform servicenow ./update-sets/
npx -y @squirex.dev/mcp-server
Protect your AI agents
from the first commit
Free for every developer. Pay only when you need to secure private repositories.
Everything you need for public projects and local development.
- done Unlimited local
squirex scan - done Unlimited public repo scanning via GitHub App
- done Inline PR annotations & SARIF output
- done All security rules included
Up to 3 private repositories. Includes full CI/CD, MCP, and Testing Center integration.
- done Everything in Community
- done Private repo scanning (up to 3 repos)
- done CI/CD enforcement & Check Run blocking
- done
SQUIREX_LICENSE_KEYfor GitHub Actions - done MCP Server integration for AI agents
- done Agentforce Testing Center Bridge
- done Email support
Unlimited private repos under one GitHub Organization. Built for orgs with 4+ agent projects across Salesforce, ServiceNow, or MCP.
- done Everything in Pro
- done Unlimited private repos under your org
- done Org-level license โ no key config needed
- done MCP Server & Testing Center Bridge
- done Priority Slack support channel
- done Dedicated SLAs & priority support