Lyrie.ai Implements Real-Time Zero-Day Tracking Across Global Enterprise Infrastructure

OTT Cybersecurity LLC, the company behind Lyrie.ai, today announced several milestones that collectively position the company as the foundational security infrastructure for the agency AI era: the deployment of a real-time zero-day tracking and disclosure system designed to alert affected organizations of active exploit activity; acceptance into the Anthropic Cyber Verification Program (CVP); and the public release of the Agent Trust Protocol (ATP), an open cryptographic standard for securing automated AI agents on the Internet.
Real-Time Zero-Day Tracking: Detecting Threats Before They Become Breached
The cybersecurity industry has long struggled with a vulnerability: vulnerabilities can be exploited in the wild for days, weeks, or months before organizations using affected systems are notified. Lyrie is designed to fill that gap.
Lyrie’s private intelligence engine constantly monitors global infrastructure, open source repositories, API environments, and agent-to-agent communication channels to identify zero-day vulnerabilities as they emerge. If zero-day is confirmed, Lyrie’s system can generate a disclosure package that includes a proof-of-concept analysis, impact assessment, and corrective action guidelines for the companies and organizations involved.
In proven cases, Lyrie has tracked and exposed operational risks affecting business and critical infrastructure environments across multiple sectors. Affected organizations received repair packages and instructions from Lyrie’s team within hours of discovery – not after public disclosure.
“The difference between a breach and a miss is often measured in hours. We built Lyrie to be a system that detects a threat before it does – and tells you exactly what to do about it.” said Guy Sheetrit, CEO and Founder of OTT Cybersecurity LLC, the company behind Lyrie.ai.
Acceptance into the Anthropic Cyber Verification program
OTT Cybersecurity LLC has been accepted into the Anthropic Cyber Verification Program (CVP), Anthropic’s framework for validating two-way cybersecurity operators. Adoption of CVP supports Lyrie’s work on vulnerability research, offensive defense tools, and red team workflows on Claude’s AI infrastructure, subject to Anthropic’s effective security and safety policies.
“Being among the first companies to be accepted into the Anthropic Cyber Verification Program validates what we’ve built. Lyrie is not a security tool that sits next to AI. It’s a security layer that AI runs on top of.”
Agent Trust Protocol: A Cryptographic Standard for AI Agent Identity
Businesses and governments are deploying autonomous AI agents at an unprecedented pace – agents that read email, write code, transfer money, sign contracts, and act on behalf of human employees. The security model for those agents has never existed at enterprise scale. Lyrie is designed to change that.
The Agent Trust Protocol (ATP), developed by Lyrie’s research team and publicly published at lyrie.ai/research, is a cryptographic standard that allows any system to verify, in real time:
- Ownership – who is the AI agent.
- Width – what you are authorized to do.
- Evidence – whether it or its instructions are mistaken.
- Shipping – who gave the authority.
- Withdrawal – whether that authority has been revoked.
“Every AI agent on the Internet today is unknown to you. You don’t know who it is, what it’s authorized to do, or whether it’s been tampered with. ATP is a protocol that changes that.” Guy adds.
The protocol is open, free of charge, and scheduled for submission to the Internet Engineering Task Force (IETF). The reference implementation is published under the MIT license at github.com/OTT-Cybersecurity-LLC/lyrie-ai.
About OTT Cybersecurity LLC and Lyrie.ai
Lyrie is an integrated offensive and defensive security platform built for the AI era:
- lyrie Hack — a single command that uses a 7-stage automated penetration test, generating proof-of-concept exploits and code-level fixes.
- Zero-day real-time tracking – independent discovery workflow and disclosure support for affected organizations.
- GPU-accelerated red team – GCG and AutoDAN adversarial workflows on the H200 GPU infrastructure, supporting Crescendo and TAP attack chains.
- OWASP ASI 2026 – Mapping to the OWASP Agetic Security Initiative threat catalog.
- Omega-Suite binary research – automatic workflow for zero detection in integrated software.
- Hardware-flexible deployment – consumer hardware with enterprise GPU clusters.
- Nine built-in security tools – recognition, exploitation, and modification of a single agent.
For more information: | Research: /research | GitHub: github.com/OTT-Cybersecurity-LLC/lyrie-ai | X: @lyrie_ai



