~35KB

OmniShield

The antivirus that can't be exploited — because it inherits nothing.

Cloud Infrastructure DevOps Enterprise Hosting Providers

The Problem

Current endpoint security agents (CrowdStrike, SentinelOne) weigh 300-500MB, consume hundreds of MB of RAM, and inherit hundreds of CVEs from their dependency chains. In July 2024, a CrowdStrike update crashed 8.5 million machines worldwide — airlines, banks, hospitals — causing $5.4B in damages. The tools meant to protect infrastructure have become the biggest risk.

The Solution

OmniShield is a 35KB security agent compiled from a proprietary bare-metal language. It monitors processes, network connections, filesystem changes, and authentication logs in real-time using direct Linux syscalls — no libc, no runtime, no dependencies. It detects crypto miners, reverse shells, unauthorized listeners, brute force attacks, and filesystem tampering. The attacker doesn't know it exists because it has no recognizable signatures.

Why Bare-Metal Matters

A 35KB binary with zero dependencies has a mathematically smaller attack surface than a 500MB agent with hundreds of libraries. There are no shared libraries to hook, no runtime to exploit, no supply chain to compromise. OmniShield operates at the same level as the attacker — raw syscalls — but watches everything they do.

Technical Specifications

Feature Value
Binary Size ~35KB
RAM Usage <1MB
Dependencies None — zero libraries, zero runtime
Architecture x86_64, direct Linux syscalls
API HTTP on port 7070, Basic Auth, CORS
Event Loop epoll — multiplexed I/O
Monitors Processes, Network, Filesystem (inotify), Auth logs

Comparison

OmniShield CrowdStrike Falcon SentinelOne
Agent size 35KB ~500MB~300MB
RAM per endpoint <1MB 200-500MB150-400MB
Dependencies 0 HundredsHundreds
Inherited CVEs 0 HundredsHundreds
Local AI Yes (embedded) No (cloud)No (cloud)
Can crash the OS No (no kernel hooks) Yes (July 2024)Possible
Supply chain risk Zero HighHigh

Use Cases

Cloud Server Protection

Deploy a 35KB agent on every VPS, droplet, or EC2 instance. Monitors processes, open ports, and file integrity in real-time. Uses less than 1MB of RAM — invisible to your workloads.

Crypto Mining Detection

Automatically detects known mining processes (xmrig, minerd, cpuminer) and suspicious CPU patterns. Alerts immediately when a compromised server starts mining.

Intrusion Detection

Monitors /etc, /usr/bin, /etc/ssh via inotify for unauthorized modifications. Detects new listening ports, reverse shells, and brute force SSH attempts in real-time.

Hosting Provider Security

White-label solution for hosting providers. One agent per customer server, negligible resource overhead, centralized threat reporting via HTTP API.