
Overview
The On-Prem Agent allows you to scan applications, file systems, container images, and source code hosted within your local or private infrastructure. The agent runs securely inside your environment and communicates with the Zero-X Cloud platform to send scan results. This section is intended for: > End Users (Security Analysts)> DevOps / Platform Engineers
End-to-End On-Prem Agent Workflow
1. Create On-Prem Agent data source from UI2. Generate API Key and download agent bundle
3. Install agent on local infrastructure
4. Verify agent is online
5. Trigger on-prem scans
6. View findings across dashboards and reports
Step 1 – Add On-Prem Agent Data Source (End User)
Navigation:
Connectors → Data Source → Add Data SourceSteps:
1. Click Add Data Source.2. Select On-Prem Agent.
3. Enter Agent Name (unique identifier for your host).
4. Click Create.
System Actions:
> System creates a new on-prem agent entry.> System generates a one-time API Key.
> Important: Copy and store the API Key securely. It will not be visible again.
> System provides an Agent Installer Bundle (.zip) for download.
Step 2 – On-Prem Agent Installation (DevOps / User)
Zero-X Cloud On-Premise Agent Setup
The Zero-X agent is a lightweight background service that: > Sends heartbeats to the Zero-X platform> Executes security scans locally
> Securely uploads scan results
2.1 Prerequisites
> Linux or macOS host (amd64)> curl and unzip installed
> Network access to Zero-X Cloud platform URL
> Required scanners installed and available in
$PATH
(e.g., trivy, semgrep)2.2 Installation Steps
1. Download Agent Bundle
From the Zero-X Cloud UI, download:zerox-agent-installer.zip
2. Unzip the Bundle
unzip zerox-agent-installer.zip
3. Run Installation Script
Execute the installation script with sudo privileges.sudo ./install-agent.sh <YOUR_API_KEY> <YOUR_ZEROX_PLATFORM_URL>
Example:
sudo ./install-agent.sh agent_abcdef1234567890 http://localhost:9002
2.3 What the Installation Script Does
> Detects operating system (Linux / macOS)> Downloads the correct agent binary
> Creates directories:
-
/opt/zerox-agent/ – agent binary-
/etc/zerox-agent/ – configuration> Writes environment configuration file:
-
/etc/zerox-agent/.env> Configures background service:
- Linux: systemd service
- macOS: launchd service
> Enables and starts the agent automatically
Step 3 – Verify Agent Status
Linux (systemd)
sudo systemctl status zerox-agentsudo journalctl -u zerox-agent -f
macOS (launchd)
sudo launchctl list | grep cloud.zerox.agentlog stream --predicate 'process == "zerox-agent"'
Expected Result
> Agent service is running> Heartbeats are sent successfully
Step 4 – Agent Online Verification (UI)
Navigation:
Connectors → Data SourceExpected Behavior:
> On-Prem Agent status changes to Online> Host details become visible
Step 5 – Trigger On-Prem Scan (End User)
Navigation:
Connectors → New ScanSteps:
1. Click New Scan.2. Select Target Type: On-Premise Agent.
3. Select Scanner Type as required:
- File System Scan
- Container Image Scan
- SAST Scan
4. Select the Agent / Resource.
5. Enter Scan Target Path (e.g., project directory path).
6. Click Scan Now.
Step 6 – View On-Prem Scan Findings
Expected Behavior
After scan completion, findings are available across the platform: 1. On-Prem Dashboard> High-level severity summary:
- Critical
- High
- Medium
- Low
2. On-Prem Findings / Vulnerabilities Module
> Detailed vulnerability and security issues
> CVE details, severity, impact, and remediation
3. Asset-Level View
> Findings mapped to:
- Servers
- Hosts
- IP Addresses
- Applications
4. can Results / Scan History
> Full scan execution details
> Timestamp, scan status, and findings