Butterfly scans your Okta, Entra ID, Auth0, Ping Identity, 1Password, Workato, Boomi, and Zapier configurations to find every AI agent registered as an OAuth app, service account, or API integration. Assess their risk, enforce policies, and back up the identity configs they depend on.
[SCAN] Scanning OAuth apps across 8 providers...
Scanning Okta, Entra ID, Auth0, PingOne...
Scanning 1Password, Workato, Boomi, Zapier...
Matching against 10 AI platform patterns...
✓ "Claude Code Assistant" (Anthropic) OAuth App Risk: 25/100
✓ "GPT-4 Integration" (OpenAI) OAuth App Risk: 45/100
✓ "svc-copilot@acme.com" (Microsoft) Svc Acct Risk: 60/100
! "LangChain Bot" (Self-Hosted) OAuth App Risk: 82/100 SHADOW
[RESULT] 4 agents found | 1 shadow AI | 1 critical risk
[BACKUP] Config backed up: 847 users, 42 recipes, 67 zaps, 6 vaults
AI agents connect to your organization through your identity providers. They register as OAuth apps. They use service accounts. They hold API keys. Most security teams have no inventory of these agents, what permissions they hold, or what data they can access.
No new agents to install. Butterfly scans your existing identity provider connections and uses pattern matching against known AI platforms to find agents.
Connect your Okta org, Entra ID tenant, Auth0 domain, Ping environment, 1Password vault, Workato workspace, Boomi account, or Zapier instance. The same connection used for backup powers agent discovery. No extra setup.
The discovery engine scans your OAuth apps, service accounts, and API integrations. It matches against known AI platform patterns: Anthropic, OpenAI, Microsoft, AWS, Google, LangChain, CrewAI, AutoGen, and more.
Each agent gets a risk score (0-100) based on credential types, grant types, staleness, MFA status, and scope breadth. Agents without governance policies are flagged as shadow AI.
A single platform that covers the full lifecycle of AI agent security across your identity infrastructure.
Build a complete inventory of every AI agent in your identity infrastructure.
Define guardrails for what AI agents can and cannot do.
Track every API key, token, and secret your AI agents use.
Back up the identity configurations that AI agents depend on.
An AI agent with admin-level OAuth scopes modifies your Okta sign-on policies. 500 users lose MFA enforcement. 20 app assignments break. Here's what happens next.
[ALERT] Policy violation detected
Agent "GPT-4 Integration" modified 3 sign-on policies
Exceeded access control boundary: write access to auth policies
[DRIFT] Configuration drift detected
Comparing current config to backup from 14:00...
- MFA required: true
+ MFA required: false ← 3 policies changed
- 2 groups deleted | 20 app assignments broken
[RESTORE] Dry-run restore initiated
Preview: 3 policies restored, 2 groups recreated, 20 assignments fixed
No conflicts detected. Ready to apply.
[DONE] Restore complete
MFA enforcement restored for 500 users
20 app assignments recovered
Time to recovery: 3 minutes
Connect your identity provider. Run a discovery scan. Know what you're dealing with.
Free trial · No credit card · Setup in 5 minutes