Hoop.dev vs Runlayer: Where MCP Gateways End and Infrastructure Security Begins

AI agents are no longer chatbots. They execute code, query databases, call APIs, and operate inside production infrastructure. The question is no longer "should we let agents access our systems?" but "how do we control what they do once they're in?"

Two products are emerging to answer different parts of that question: Runlayer and Hoop. They are frequently mentioned together, but they solve fundamentally different problems at different layers of the stack. This post breaks down exactly where each one sits, what it controls, and how to think about them when building your AI infrastructure security strategy.

The architecture: how AI agents actually work

Before comparing products, it helps to understand the architecture that both products operate within.

An AI agent is a loop. It calls a model (Claude, GPT, etc.) repeatedly, interprets results, and takes actions. Those actions fall into two categories:

  1. Local operations: writing files, generating code, creating presentations
  2. Data operations: querying databases, calling APIs, reading from external systems

Local operations are useful but limited. The real power of agents comes from data operations, where an agent can query your Postgres database, call your internal APIs, and reason over live production data inside its loop.

MCP (Model Context Protocol) standardizes how agents connect to external data sources. Instead of building custom integrations for every database and API, MCP provides a single protocol that any agent client (Cursor, Claude Code, VS Code, ChatGPT) can use to reach any data source.

This creates a three-part architecture:

  • Agent → Model: the prompt/response path where the agent sends context and receives instructions
  • Agent → MCP/Data: the data path where the agent queries databases, APIs, and other systems
  • Agent → Local system: file writes, code execution, local tool use

The security surface area is enormous. Sensitive data flows in both directions. The model sees everything the agent sees. The agent can execute anything it has access to.

Where Runlayer sits

Runlayer is an MCP catalog and governance platform. It sits at the connection layer, controlling which MCP servers agents and developers can connect to.

Think of it as an app store for MCP servers, but enterprise-grade. IT approves which servers are in the catalog. Developers get one-click access to approved servers without editing JSON configs or managing API keys. Every connection is logged. Unapproved MCP servers are blocked.

Runlayer's core capabilities:

  • MCP server catalog: centralized registry of approved MCP servers with security scanning
  • Threat detection: scans for tool poisoning, prompt injection in MCP server definitions, and permission drift
  • Identity integration: SSO via Okta/Entra, SCIM, group-based permissions
  • Audit trails: logs every MCP connection and tool invocation
  • Shadow MCP detection: identifies when developers connect to unapproved MCP servers
  • One-click deployment: no JSON editing, works with 300+ MCP clients

Runlayer answers a critical question: which MCP servers can my developers use?

It does this well. The MCP ecosystem has thousands of servers, many of them unvetted, and some actively malicious. Having a curated, scanned catalog with identity-based access is a real problem that needs solving.

Where Hoop sits

Hoop is an infrastructure access gateway that operates at the wire protocol level. It sits between any actor (human, AI agent, or service account) and the actual infrastructure: databases, Kubernetes clusters, SSH servers, and MCP data sources.

Hoop doesn't care how you connected. It cares what you do once you're connected. Every query, every command, every response passes through the gateway, where it can be inspected, masked, blocked, or recorded.

Hoop's core capabilities:

  • Wire-protocol inspection: parses Postgres, MySQL, MongoDB, SSH, K8s, and MCP traffic in real time
  • Data masking: ML-powered PII detection that masks sensitive fields in query results before they reach the client (or the AI model)
  • Command guardrails: blocks destructive operations (DROP TABLE, DELETE without WHERE, rm -rf) before they execute
  • Session recording: full replay-grade capture of every session, command, and response
  • JIT access: time-bound, just-in-time access with automatic revocation
  • Break-glass workflows: approval flows via Slack/Teams/Jira for high-risk operations
  • Runbooks: parameterized, Git-stored templates for common operations with built-in guardrails
  • Compliance automation: auto-generated evidence for SOC 2, GDPR, PCI DSS, HIPAA

For AI agents specifically, Hoop operates on both paths:

Between the agent and the model (prompt/response path):

  • Blocks sensitive data from being sent to the model via guardrails
  • Blocks prompt injection attacks before they reach the model
  • Audits and controls every action the agent executes

Between the agent and data sources (data path):

  • Masks PII in query results before the agent (and therefore the model) ever sees them
  • Blocks dangerous write operations the agent attempts
  • Records every data interaction for compliance and forensics

Hoop answers a different question: what can any actor do once they're inside my infrastructure?

Feature comparison

CapabilityRunlayerHoop
MCP server catalog/registryYes, core productNo
MCP server security scanningYes, automatedNo
Shadow MCP detectionYesNo
MCP-specific threat detection (tool poisoning, rug pulls)YesNo
One-click MCP deploymentYesNo
Database wire-protocol inspectionNoYes (Postgres, MySQL, MongoDB, MSSQL, etc.)
PII masking on data responsesMCP payload maskingML-powered, wire-level masking across all protocols
Command-level guardrailsNoYes (block DROP, DELETE, rm -rf, etc.)
Session recording with replayNoYes, full session capture
JIT / time-bound accessNoYes, with automatic revocation
Break-glass approval workflowsMCP server approvalOperational approval via Slack/Teams/Jira
SSH access governanceNoYes
Kubernetes exec governanceNoYes
Runbooks / parameterized templatesNoYes, Git-based
SOC 2 / HIPAA / PCI evidence generationAudit logsAutomated compliance evidence
Identity integrationOkta, Entra, SSO, SCIMOkta, Entra, any IdP
AI agent governanceControls which tools agents useControls what agents do with those tools
Open sourceNoYes (CNCF member)
Deployment modelSaaS or self-hosted VPCSaaS or self-hosted (Docker, K8s, AWS)

The "front door vs. everything behind it" framing

The simplest way to understand the difference:

Runlayer secures the front door. It controls which MCP servers agents and developers can connect to. It scans those servers for vulnerabilities. It enforces identity and permissions at the connection layer. This is valuable and necessary.

Hoop controls everything behind the door. Once an agent is connected to a database or API (whether through MCP or any other method), Hoop governs what it can do. It masks PII in responses. It blocks destructive commands. It records every interaction. It enforces JIT access and approval workflows.

These are not competing products. They operate at different layers. An enterprise that is serious about AI infrastructure security likely needs both: Runlayer to control the MCP catalog and prevent shadow tool sprawl, and Hoop to govern what happens at the data layer once agents are operating.

But if you have to prioritize, the question becomes: where is the actual risk?

The risk of an agent connecting to the wrong MCP server is real. But the risk of an agent running DELETE FROM users on your production database, or leaking PII through an unmasked query response that gets sent to an AI model, is existential.

Catalog governance prevents bad connections. Wire-level governance prevents bad outcomes.

When to use each

Use Runlayer when:

  • You need to govern which MCP servers developers can connect to from their IDEs
  • Shadow MCP usage is a growing concern
  • You want a curated, security-scanned catalog of approved tools
  • Your primary concern is MCP-specific attack vectors (tool poisoning, fake servers)

Use Hoop when:

  • You need to govern what humans and AI agents do inside production infrastructure
  • Engineers or agents access databases with sensitive data (PII, financial records, health data)
  • You need PII masking, command guardrails, and session recording at the data layer
  • You need JIT access, break-glass workflows, and compliance evidence generation
  • Your infrastructure spans databases, Kubernetes, SSH, and MCP

Use both when:

  • You want full-stack AI infrastructure security from tool discovery to data execution
  • Your compliance requirements demand both connection governance and session-level audit trails
  • You operate at enterprise scale with multiple teams, protocols, and data sources

Summary

The AI agent security landscape is splitting into two layers: connection governance (which tools can agents use?) and execution governance (what can agents do with those tools?). Runlayer is building the definitive platform for the first layer. Hoop is building the definitive platform for the second.

Both are necessary. Neither is sufficient alone. The companies that get AI agent security right will be the ones that think about both layers, not just the front door.