Showing 2 open source projects for "data protection tool"

View related business solutions
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • Application Monitoring That Won't Slow Your App Down Icon
    Application Monitoring That Won't Slow Your App Down

    AppSignal's Rust-based agent is lightweight and stable. Already running in thousands of production apps.

    Full APM with errors, performance, logs, and uptime monitoring. 99.999% uptime SLA on the platform itself.
    Start Free
  • 1
    Claude Code

    Claude Code

    Claude Code is an agentic coding tool that lives in your terminal

    ...It helps developers code faster by executing routine tasks, explaining complex code snippets, and managing git workflows—all via natural language commands. Claude Code integrates seamlessly into your terminal, IDE, or GitHub by tagging @claude to interact with your code context. The tool is designed to simplify development by automating repetitive work and providing instant clarifications on code behavior. User feedback and usage data are collected responsibly, with strict privacy safeguards and limited retention, ensuring no feedback is used to train generative models. Claude Code is open and actively maintained with community-driven bug reporting and feature requests. ...
    Downloads: 578 This Week
    Last Update:
    See Project
  • 2
    Claw Hunter

    Claw Hunter

    MDM-ready scripts for detecting and monitoring OpenClaw

    ...Claw-Hunter addresses this emerging threat landscape by providing visibility into these agents, helping organizations identify instances running within their environments. It focuses on uncovering “shadow AI,” which refers to unauthorized or unmanaged AI agents that operate outside traditional security controls. The tool performs risk assessment by auditing agent permissions, capabilities, and access levels, allowing security teams to evaluate potential attack surfaces. It also helps ensure that these agents do not unintentionally expose sensitive data or create unauthorized access paths across systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB