How It Works

How Checkpoint protects your site

An agent shows up. You can’t tell.

Right now, AI agents browse your site using real user credentials. Your analytics counts them as users. Your server sees a browser. Your WAF sees a logged-in human. But it’s an AI agent, acting on Sarah’s behalf, using her session cookie. And you have no way to know.

Incoming Request
User-AgentMozilla/5.0 (Windows NT 10.0)
Sessionsarah.chen@company.com
IP192.168.1.42
Looks like Sarah. But is it?
Detect

Checkpoint sees what your server can’t.

One script tag. That’s all it takes. Checkpoint’s detection layer identifies AI agents in real time using signature-based analysis, not user-agent strings, not IP lists. Real behavioral signatures. You see the agent, the user who authorized it, session duration, pages visited, and a confidence score. Passive. Zero performance impact.

Agent Detected
AgentClaude (Anthropic)
Identified
Usersarah.chen@company.com
Confidence98%
Session3m 42s · 7 pages
Enforce

Your site, your rules.

Now that you can see the agents, decide what they can do. Enforce gives you a policy engine at the edge. Decisions happen before requests reach your origin. Allow trusted agents. Block bad actors. Challenge unknowns. Rate-limit scrapers. Redirect agents to dedicated endpoints. Per-path, per-agent, configured through the dashboard or API. No code changes on your end. Your application doesn’t need to know.

Enforcing: /api/checkout
Claude (Anthropic) for sarah.chen
POST /api/checkout
Identityverified
Delegationvalid until 6pm
Rate limit12/100 today
Scoperead-only
checkout requires write access
Action:redirect → /api/products
Latency: 9ms
Govern

Identity that’s cryptographic, not cosmetic.

Every agent gets a DID: a cryptographic identity that works like an unfakeable agent passport. A Verifiable Credential specifies exactly what it’s allowed to do, and when that authorization expires. Every action produces a signed proof. If something goes wrong, you have a tamper-proof audit trail. And if you need to revoke access? One click. This is what trust infrastructure looks like.

Identity Verified
DIDdid:key:z6Mkf5rG...
Delegatorsarah.chen@company.com
CredentialVerifiable Credential
Permissions
Browse products
Read pricing
Process payments
Access admin
Expires2026-03-15 18:00 UTC
Reputation94/100 ★★★★☆
Audit trail3 signed proofs