Loading video player...
AI agents are everywhere ā but how do they actually work under the hood? In this video, I break down the complete architecture of AI agents: the agentic loop, tool calling, MCP (Model Context Protocol), and scaffolding. I demo the agentic loop live using Claude Code, then show you why a security engineer sees this differently than everyone else making AI explainers. This is Part 1 of a series on AI agents and security. No hype, no marketing ā just how the systems actually work, with real code and real data. š Stats referenced: - Gartner: 40% of enterprise apps will embed AI agents by end of 2026 - Cisco State of AI Security 2026: 83% deploying, 29% ready to secure - BlueRock Security: 36.7% of MCP servers vulnerable to SSRF - Antiy CERT: 1,184 malicious packages in OpenClaw ClawHub registry š Resources: - Gartner report: https://www.gartner.com/en/newsroom/press-releases/2025-08-26-gartner-predicts-40-percent-of-enterprise-apps-will-feature-task-specific-ai-agents-by-2026-up-from-less-than-5-percent-in-2025 - Cisco State of AI Security 2026: https://www.cisco.com/c/en/us/products/security/state-of-ai-security.html - NIST RFI on AI Agent Security: https://www.federalregister.gov/documents/2026/01/08/2026-00206/request-for-information-regarding-security-considerations-for-artificial-intelligence-agents - Anthropic MCP docs: https://modelcontextprotocol.io #AIAgents #AgenticAI #CyberSecurity #MCP #ModelContextProtocol #LLM #AI #MachineLearning #SecurityEngineering