How 1,000 Navil Nodes Protect Each Other Without Sharing Your Data
How 1,000 Navil Nodes Protect Each Other Without Sharing Your Data
A prompt injection discovered on one machine should protect every other machine within seconds. But how do you share threats without sharing data?
This is the central tension of community threat intelligence. The more participants share, the better everyone's defenses. But sharing raw data — tool responses, agent identities, file contents — is a non-starter. No security team will opt into surveillance to get threat feeds.
Navil solves this with a Give-to-Get model: contribute anonymized threat signals, receive the global threat blocklist. Your data never leaves your machine. Threat patterns do.
The Problem: Every Node Is an Island
Without shared intelligence, every Navil deployment discovers threats independently. An attacker finds a prompt injection that works against a popular MCP server. They use it on your deployment. You detect it, write a policy, move on.
Meanwhile, 999 other deployments are vulnerable to the exact same attack. They'll each discover it on their own — if they're lucky. Some won't notice at all.
This is how security worked for decades: each organization builds its own defenses in isolation. Threat intel sharing platforms exist (STIX/TAXII, ISACs), but they're designed for enterprises with dedicated security teams. They don't work at the speed of AI agents, and they don't work for individual developers.
The MCP ecosystem needs something different: automatic, privacy-preserving, real-time threat sharing that works without human intervention.
The Give-to-Get Model
Here's the deal Navil offers every deployment:
What leaves your machine:
- Anomaly type (e.g., "tool_call_frequency_spike")
- Severity level (critical, high, medium, low)
- Confidence score (0.0–1.0)
- Tool name (e.g., "filesystem_read")
- Timing metadata (hour of day, duration)
That's it. Categorical labels and numeric aggregates. No raw data. No prompts. No tool responses. No file contents.
What NEVER leaves your machine:
- Raw request/response data
- Agent identities (HMAC-SHA256 hashed before any transmission)
- Tool response payloads
- File contents or paths
- User prompts or LLM outputs
- Credentials or tokens
What you get back:
- The Global Threat Blocklist — 568 patterns across 16 attack categories
- Real-time updates as new threats are discovered across the network
- Pattern signatures that your local detectors can match against
The exchange is simple: you contribute signal, you receive protection. The more nodes contribute, the faster new threats get identified, and the stronger everyone's defenses become.
How the Network Effect Works
Let's trace a real scenario.
Hour 0: An attacker discovers that a specific sequence of tool calls against the GitHub MCP server can exfiltrate repository secrets. They craft a prompt injection that triggers this sequence.
Hour 1: The attack hits Node A. Navil's anomaly detectors fire — tool sequence anomaly (detector 5), unusual data volume (detector 3), first-time tool usage (detector 2). Three detectors firing simultaneously = high confidence. Node A's local policy blocks the exfiltration.
Hour 1, +30 seconds: Node A's telemetry sync publishes the anonymized signal: {type: "tool_sequence_anomaly", severity: "critical", confidence: 0.94, tool: "github_push", category: "data_exfiltration"}. No raw data. Just the pattern.
Hour 1, +2 minutes: Navil's threat aggregation service receives the signal. It correlates with similar signals from Nodes B and C who saw probing attempts earlier. The pattern is confirmed and added to the Global Threat Blocklist.
Hour 1, +3 minutes: All 1,000 nodes receive the updated blocklist via their next ThreatIntelFetcher poll. Every deployment now blocks this attack vector — including the 997 nodes that haven't been targeted yet.
Total time from first attack to global protection: 3 minutes.
Compare that to traditional threat intel sharing: days to weeks for IOCs to propagate through ISACs, if they propagate at all.
The Global Threat Blocklist
The blocklist is the output of the entire network's collective intelligence. As of today:
- 568 patterns across 16 attack categories
- Categories include: prompt injection, tool poisoning, credential exfiltration, data exfiltration, privilege escalation, lateral movement, session hijacking, supply chain attacks, and more
- Each pattern includes: attack signature, severity, affected tool categories, recommended policy rules
- Updated continuously as new threats are discovered
Your local Navil instance fetches the blocklist on startup via ThreatIntelFetcher and polls for updates periodically. New patterns are applied to your detection pipeline automatically — no manual intervention required.
Privacy Architecture
Trust but verify. Here's exactly how Navil ensures your data stays yours.
Agent identity hashing: Before any telemetry leaves your machine, agent identifiers are hashed with HMAC-SHA256 using a locally-generated key. The network sees a7f3b2c..., not my-production-agent. You can correlate alerts locally (you have the key), but the network cannot identify your agents.
No raw data transmission: The telemetry sync module (navil/cloud/telemetry_sync.py) only transmits structured categorical data. There is no code path that sends raw tool responses, prompts, or file contents. You can audit this yourself — the module is open source.
Full opt-out:
export NAVIL_DISABLE_CLOUD_SYNC=trueOne environment variable. Cloud sync stops entirely. You still get local anomaly detection, local policies, local everything. You just don't contribute to or receive from the network.
Audit what's sent:
Want to see exactly what telemetry leaves your machine? Inspect the sync module directly:
# View the telemetry payload structure
cat $(python -c "import navil; print(navil.__path__[0])")/cloud/telemetry_sync.pyEvery field is documented. Every transmission is logged locally. No surprises.
Running Your Own Threat Feed
For organizations that want community intelligence within their own boundary, Navil supports private threat networks. Deploy your own aggregation service, connect your internal nodes, and build threat intelligence from your own fleet — without any data leaving your network.
This is especially relevant for enterprises running dozens or hundreds of agents across teams. The same Give-to-Get model works internally: each agent contributes behavioral signals, the private network builds organization-specific threat patterns.
The Flywheel
The community threat network creates a compounding advantage:
- More nodes → more diverse signal → threats detected faster
- Faster detection → smaller blast radius → more people trust the network
- More trust → more nodes join → back to step 1
Every new Navil deployment makes every existing deployment more secure. This is the network effect applied to agent security.
Today, the network covers 568 patterns. Six months ago, it was zero. The growth rate accelerates as more nodes contribute — each new deployment doesn't just consume threat intel, it generates it.
Getting Started
The community threat network is enabled by default. Install Navil and you're contributing to and benefiting from collective intelligence immediately:
pip install navilInitialize and start:
navil init
navil startCheck your connection to the network:
navil network statusView the current threat blocklist:
navil threats list --severity criticalOpt out if you prefer:
export NAVIL_DISABLE_CLOUD_SYNC=trueNo judgment. Local-only mode is fully supported.
What's Next
The threat network protects against known patterns. But what about measuring how well you're actually protected? In the next post, we'll cover Navil's coverage scoring and pen testing — how navil test runs 200 attack simulations against your setup and gives you an actual security score, not a feeling.
568 threat patterns. 16 attack categories. Zero raw data shared. Your agents are part of something bigger now — a network that gets smarter every time an attack is detected anywhere.
Install Navil
Join the community threat network and protect your agents with collective intelligence:
pip install navilVisit navil.ai to explore the dashboard, see the live threat feed, or join the community. Open source. Privacy-first. Security that scales with the network.
Get your coverage score
See how well your AI agents are protected against known threats.