Show HN: Logira – eBPF runtime auditing for AI agent runs

Published: (March 1, 2026 at 06:25 PM EST)
1 min read

Source: Hacker News

Overview

I started using Claude Code (claude --dangerously-skip-permissions) and Codex (codex --yolo) and realized I had no reliable way to know what they actually did. The agent’s own output tells a story, but it’s the agent’s story.

Logira records exec, file, and network events at the OS level via eBPF, scoped per run. Events are saved locally in JSONL and SQLite. It ships with default detection rules for credential access, persistence changes, suspicious exec patterns, and more. It operates in observe‑only mode – it never blocks.

Features

  • eBPF‑based monitoring of exec, file, and network events, scoped per run.
  • Local storage of events in JSONL and SQLite formats.
  • Default detection rules for:
    • Credential access
    • Persistence changes
    • Suspicious execution patterns
    • …and more.
  • Observe‑only mode – never blocks any activity.

Repository

Logira on GitHub

Discussion

Hacker News comments (12 points)

0 views
Back to Blog

Related posts

Read more »

Iran War Cost Tracker

U.S. TAXPAYER DOLLARS · LIVE ESTIMATE Live Estimate Overview - Operation Epic Fury — Estimated U.S. Cost Since Strikes Began: $0 - Daily Burn Rate Breakdown – T...