Hoop.dev vs Runlayer: Where MCP Gateways End and Infrastructure Security Begins
AI agents are no longer chatbots. They execute code, query databases, call APIs, and operate inside production infrastructure. The question is no longer "should we let agents access our systems?" but "how do we control what they do once they're in?"
Two products are emerging to answer different parts of that question: Runlayer and Hoop. They are frequently mentioned together, but they solve fundamentally different problems at different layers of the stack. This post breaks down exactly where each one sits, what it controls, and how to think about them when building your AI infrastructure security strategy.

The architecture: how AI agents actually work
Before comparing products, it helps to understand the architecture that both products operate within.
An AI agent is a loop. It calls a model (Claude, GPT, etc.) repeatedly, interprets results, and takes actions. Those actions fall into two categories:
- Local operations: writing files, generating code, creating presentations
- Data operations: querying databases, calling APIs, reading from external systems
Local operations are useful but limited. The real power of agents comes from data operations, where an agent can query your Postgres database, call your internal APIs, and reason over live production data inside its loop.

MCP (Model Context Protocol) standardizes how agents connect to external data sources. Instead of building custom integrations for every database and API, MCP provides a single protocol that any agent client (Cursor, Claude Code, VS Code, ChatGPT) can use to reach any data source.
This creates a three-part architecture:
- Agent → Model: the prompt/response path where the agent sends context and receives instructions
- Agent → MCP/Data: the data path where the agent queries databases, APIs, and other systems
- Agent → Local system: file writes, code execution, local tool use
The security surface area is enormous. Sensitive data flows in both directions. The model sees everything the agent sees. The agent can execute anything it has access to.
Where Runlayer sits
Runlayer is an MCP catalog and governance platform. It sits at the connection layer, controlling which MCP servers agents and developers can connect to.
Think of it as an app store for MCP servers, but enterprise-grade. IT approves which servers are in the catalog. Developers get one-click access to approved servers without editing JSON configs or managing API keys. Every connection is logged. Unapproved MCP servers are blocked.
Runlayer's core capabilities:
- MCP server catalog: centralized registry of approved MCP servers with security scanning
- Threat detection: scans for tool poisoning, prompt injection in MCP server definitions, and permission drift
- Identity integration: SSO via Okta/Entra, SCIM, group-based permissions
- Audit trails: logs every MCP connection and tool invocation
- Shadow MCP detection: identifies when developers connect to unapproved MCP servers
- One-click deployment: no JSON editing, works with 300+ MCP clients
Runlayer answers a critical question: which MCP servers can my developers use?
It does this well. The MCP ecosystem has thousands of servers, many of them unvetted, and some actively malicious. Having a curated, scanned catalog with identity-based access is a real problem that needs solving.

Where Hoop sits
Hoop is an infrastructure access gateway that operates at the wire protocol level. It sits between any actor (human, AI agent, or service account) and the actual infrastructure: databases, Kubernetes clusters, SSH servers, and MCP data sources.
Hoop doesn't care how you connected. It cares what you do once you're connected. Every query, every command, every response passes through the gateway, where it can be inspected, masked, blocked, or recorded.
Hoop's core capabilities:
- Wire-protocol inspection: parses Postgres, MySQL, MongoDB, SSH, K8s, and MCP traffic in real time
- Data masking: ML-powered PII detection that masks sensitive fields in query results before they reach the client (or the AI model)
- Command guardrails: blocks destructive operations (DROP TABLE, DELETE without WHERE, rm -rf) before they execute
- Session recording: full replay-grade capture of every session, command, and response
- JIT access: time-bound, just-in-time access with automatic revocation
- Break-glass workflows: approval flows via Slack/Teams/Jira for high-risk operations
- Runbooks: parameterized, Git-stored templates for common operations with built-in guardrails
- Compliance automation: auto-generated evidence for SOC 2, GDPR, PCI DSS, HIPAA
For AI agents specifically, Hoop operates on both paths:
Between the agent and the model (prompt/response path):
- Blocks sensitive data from being sent to the model via guardrails
- Blocks prompt injection attacks before they reach the model
- Audits and controls every action the agent executes
Between the agent and data sources (data path):
- Masks PII in query results before the agent (and therefore the model) ever sees them
- Blocks dangerous write operations the agent attempts
- Records every data interaction for compliance and forensics
Hoop answers a different question: what can any actor do once they're inside my infrastructure?
Feature comparison
| Capability | Runlayer | Hoop |
|---|---|---|
| MCP server catalog/registry | Yes, core product | No |
| MCP server security scanning | Yes, automated | No |
| Shadow MCP detection | Yes | No |
| MCP-specific threat detection (tool poisoning, rug pulls) | Yes | No |
| One-click MCP deployment | Yes | No |
| Database wire-protocol inspection | No | Yes (Postgres, MySQL, MongoDB, MSSQL, etc.) |
| PII masking on data responses | MCP payload masking | ML-powered, wire-level masking across all protocols |
| Command-level guardrails | No | Yes (block DROP, DELETE, rm -rf, etc.) |
| Session recording with replay | No | Yes, full session capture |
| JIT / time-bound access | No | Yes, with automatic revocation |
| Break-glass approval workflows | MCP server approval | Operational approval via Slack/Teams/Jira |
| SSH access governance | No | Yes |
| Kubernetes exec governance | No | Yes |
| Runbooks / parameterized templates | No | Yes, Git-based |
| SOC 2 / HIPAA / PCI evidence generation | Audit logs | Automated compliance evidence |
| Identity integration | Okta, Entra, SSO, SCIM | Okta, Entra, any IdP |
| AI agent governance | Controls which tools agents use | Controls what agents do with those tools |
| Open source | No | Yes (CNCF member) |
| Deployment model | SaaS or self-hosted VPC | SaaS or self-hosted (Docker, K8s, AWS) |
The "front door vs. everything behind it" framing
The simplest way to understand the difference:
Runlayer secures the front door. It controls which MCP servers agents and developers can connect to. It scans those servers for vulnerabilities. It enforces identity and permissions at the connection layer. This is valuable and necessary.
Hoop controls everything behind the door. Once an agent is connected to a database or API (whether through MCP or any other method), Hoop governs what it can do. It masks PII in responses. It blocks destructive commands. It records every interaction. It enforces JIT access and approval workflows.
These are not competing products. They operate at different layers. An enterprise that is serious about AI infrastructure security likely needs both: Runlayer to control the MCP catalog and prevent shadow tool sprawl, and Hoop to govern what happens at the data layer once agents are operating.
But if you have to prioritize, the question becomes: where is the actual risk?
The risk of an agent connecting to the wrong MCP server is real. But the risk of an agent running DELETE FROM users on your production database, or leaking PII through an unmasked query response that gets sent to an AI model, is existential.
Catalog governance prevents bad connections. Wire-level governance prevents bad outcomes.
When to use each
Use Runlayer when:
- You need to govern which MCP servers developers can connect to from their IDEs
- Shadow MCP usage is a growing concern
- You want a curated, security-scanned catalog of approved tools
- Your primary concern is MCP-specific attack vectors (tool poisoning, fake servers)
Use Hoop when:
- You need to govern what humans and AI agents do inside production infrastructure
- Engineers or agents access databases with sensitive data (PII, financial records, health data)
- You need PII masking, command guardrails, and session recording at the data layer
- You need JIT access, break-glass workflows, and compliance evidence generation
- Your infrastructure spans databases, Kubernetes, SSH, and MCP
Use both when:
- You want full-stack AI infrastructure security from tool discovery to data execution
- Your compliance requirements demand both connection governance and session-level audit trails
- You operate at enterprise scale with multiple teams, protocols, and data sources
Summary
The AI agent security landscape is splitting into two layers: connection governance (which tools can agents use?) and execution governance (what can agents do with those tools?). Runlayer is building the definitive platform for the first layer. Hoop is building the definitive platform for the second.
Both are necessary. Neither is sufficient alone. The companies that get AI agent security right will be the ones that think about both layers, not just the front door.