Agents can't know what they don't know to learn.
Supply chain attacks blindside us, turning known-good patterns into brand new attack vectors.
This is how agents keep up. This is how we fight back.
Hilt is a supply chain trust oracle. It aggregates advisory feeds, scores package provenance in real time, and gives AI coding agents a gate to query before every install. Your agent doesn't need to understand security. It just needs Hilt.
The official Axios npm package (100M+ weekly downloads) was compromised via a hijacked maintainer account. Two poisoned versions deployed a cross-platform RAT to every machine that ran npm install during the exposure window. Every AI coding agent in the world would have installed it without hesitation. Hilt would have blocked it.
The Axios compromise produced detectable anomalies in registry metadata hours before any agent or developer pulled the package. Current tooling doesn't check.
Same trust registry, same scoring engine. Different interfaces for agents, pipelines, and people.
{
"mcpServers": {
"hilt": {
"url": "https://mcp.trusthilt.com/sse"
}
}
}
# Check a package before install curl -X POST https://api.trusthilt.com/v1/check \ -H "Authorization: Bearer $HILT_KEY" \ -d '{"package": "axios", "version": "1.14.1", "registry": "npm"}' # → { "trust": "UNTRUSTED", "signals": ["maintainer_change", "provenance_break", "dependency_injection"], "score": 0.12 }
The API and MCP server are built. We're hardening for public access. Drop your email and we'll let you know when it's live.
No spam. Just a launch notification and access instructions.