Skip to main content

Enterprise AI Engineering Control Plane — secure, token-optimized, context-aware governance for coding agents.

Project description

Agentra

Enterprise AI Engineering Control Plane

Secure, govern, and optimize AI coding agents — automatically.

Python 3.11+ Tests License: MIT


Agentra is a DevSecOps control plane for AI coding assistants. It auto-detects your project stack, enforces 21 security policies across 7 categories, manages context token budgets, and generates tailored instruction files for every major agent platform.

40+ Technologies Detected21 Security Policies14 Built-in Skills
7 Agent Platforms5 Compliance Frameworks11 CLI Commands

Quick Start

# Install
pip install agentra

# Initialize — auto-detect stack, generate agent instruction files
ag init --mode quick

# Run security governance checks
ag enforce

# Check a command before running it
ag simulate "rm -rf /tmp/build"

# Run benchmarks and generate reports
ag benchmark

Features

Feature Description
🔍 Stack Detection Auto-detect languages, frameworks, databases, cloud providers, CI/CD, and agents with confidence scores
🛡 Security Governance 21 policies across database, execution, secret, git, infrastructure, prompt injection, and runtime categories
🧩 Skills System 14 domain skills (FastAPI, Terraform, K8s, Spark, Airflow, PostgreSQL, Snowflake, dbt, Kafka, OpenAI, LangChain, MCP, Databricks, Karpathy)
📦 Token Optimization Deduplicate, prioritize, compress, and budget-fit instructions — 30-60% token savings
🔌 Agent Adapters Native instruction files for Claude, Cursor, Copilot, Aider, Windsurf, Continue.dev, and universal AGENTS.md
Execution Safety Risk-classify commands, block destructive patterns, sandbox with approval gates, dry-run mode
Compliance Map violations to SOC2, ISO27001, PCI DSS, HIPAA, NIST frameworks
📊 Benchmarking Before/after metrics for every skill with HTML + Markdown report generation

CLI Commands

Command Description
ag init Initialize project — detect stack, save config, generate agent files
ag detect Scan and display detected technologies with confidence scores
ag enforce Run security policies against codebase, report violations with risk scoring
ag optimize Show token optimization analysis: deduplication, compression, budget fitting
ag simulate <cmd> Dry-run a command through the execution safety engine
ag explain <rule> Display full details of a security policy (e.g., ag explain SEC-001)
ag validate Full pipeline: governance + compliance + optimization in one command
ag benchmark Run skill benchmarks, generate Markdown + HTML reports
ag audit View local audit log of all Agentra actions
ag doctor Health check: verify config, agent files, .gitignore
ag version Display version

Usage Examples

# Enterprise mode with SOC2 + ISO27001 compliance
ag init --mode enterprise --agents claude,copilot

# Explain a specific policy rule
ag explain DB-001
#   DB-001 — no-auto-drop
#   Severity: CRITICAL │ Category: database
#   Never auto-execute DROP TABLE/DATABASE without explicit approval

# Full validation pipeline
ag validate
#   Governance:  4 violations │ Risk: 29.0 │ Blast Radius: high
#   Compliance:  SOC2: 3 findings │ PCI_DSS: 2 findings
#   Optimization: 3,840 → 2,112 tokens (45.0% reduction)

Security Policies

21 built-in policies across 7 categories:

Category Policies Key Rules
Database DB-001, DB-002, DB-003 No auto-DROP, no unguarded mutations, require rollback plans
Execution EX-001 – EX-004 No inline shell, no curl|bash, no eval/exec, no rm -rf
Secrets SEC-001 – SEC-003 No hardcoded secrets, no key logging, no secret persistence
Git GIT-001 – GIT-003 No force push, no main commits, no secret commits
Infrastructure INF-001 – INF-003 No public resources, no wildcard IAM, require encryption
Prompt Injection PI-001 – PI-003 Detect injection, hidden injections, validate external instructions
Runtime RT-001, RT-002 No debug in prod, require error handling

Agent Adapters

Generates native instruction files for each platform:

Platform Output File Format
Claude CLAUDE.md Markdown
Cursor .cursorrules Markdown
GitHub Copilot .github/copilot-instructions.md Markdown
Aider .aider.conf.yml YAML
Windsurf .windsurfrules Markdown
Continue.dev .continue/config.json JSON
Universal AGENTS.md Markdown

Architecture

agentra/
├── cli/             # Typer CLI with Rich output
├── detection/       # Stack detection engine (40+ technologies)
├── governance/      # Security policy engine (21 rules, 7 categories)
├── optimizer/       # Token optimization (dedup, prioritize, compress, budget-fit)
├── adapters/        # Agent platform adapters (7 platforms)
├── skills/          # Domain skill packs (14 built-in)
├── execution/       # Execution safety engine (risk classify, sandbox, approve)
├── onboarding/      # Project initialization (4 modes)
├── compliance/      # Compliance mapping (SOC2, ISO27001, PCI DSS, HIPAA, NIST)
├── benchmarks/      # Skill benchmarking with before/after metrics
├── renderers/       # HTML + Markdown report generation
├── risk/            # Risk scoring and blast radius estimation
├── telemetry/       # Local-only JSON audit logging
└── models.py        # Pydantic data models

Onboarding Modes

Mode Security Compliance Token Budget Best For
quick Standard 12k / 4k / 2k Fast dev setup
guided Strict All 5 frameworks 12k / 4k / 2k Interactive comprehensive
enterprise Enterprise SOC2 + ISO27001 16k / 6k / 3k Production deployments
ci Standard 8k / 3k / 1.5k CI/CD pipelines

Benchmarking & Reports

Every skill is benchmarked with before/after metrics:

  • Instruction Token Cost — tokens consumed by skill instructions
  • Security Policy Coverage — policies activated by the skill
  • Context Relevance — stack-match relevance score (0–1)
  • Instruction Compression — compression ratio achieved
ag benchmark --output reports/
# ✓ Benchmark report (MD):   reports/benchmark-report.md
# ✓ Benchmark report (HTML): reports/benchmark-report.html

The HTML report is a self-contained dark-themed dashboard with stat cards, metric bars, and tables. Open it directly in a browser.

Configuration

Agentra uses .agentra.yml:

project:
  name: my-project
  languages: [python]
  frameworks: [fastapi]
  sdks: [openai]

security:
  mode: enterprise
  edr_safe: true
  compliance: [SOC2, ISO27001]

optimization:
  minimal_context: true
  token_budget:
    input: 12000
    output: 4000

agents: [claude, copilot, cursor]
skills: [fastapi, postgresql, karpathy]

Documentation

Full interactive documentation is available at docs/index.html — a storybook-style guide covering every feature, command, policy, skill, and adapter with usage examples. A Markdown version is at docs/index.md.

Development

# Install dev dependencies
pip install -e ".[dev]"

# Run tests (72 tests)
pytest tests/ -v

# Lint
ruff check agentra/

# Type check
mypy agentra/

Acknowledgements

This project was inspired by agent-policykit by Siddharth Rathore. Thanks for the idea and the foundational work that sparked Agentra.

License

MIT

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

agentra-0.1.0.tar.gz (48.8 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

agentra-0.1.0-py3-none-any.whl (47.7 kB view details)

Uploaded Python 3

File details

Details for the file agentra-0.1.0.tar.gz.

File metadata

  • Download URL: agentra-0.1.0.tar.gz
  • Upload date:
  • Size: 48.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for agentra-0.1.0.tar.gz
Algorithm Hash digest
SHA256 8957e2f8a17554da57f13491e4b951f31f57a1b56d4c0d81cfea87b8506aa9ab
MD5 6abf1079f94514489f4003e013246900
BLAKE2b-256 08caf49e90065f984851c0d83fb03a05da4c393062abce7fc7590bbe968abef9

See more details on using hashes here.

File details

Details for the file agentra-0.1.0-py3-none-any.whl.

File metadata

  • Download URL: agentra-0.1.0-py3-none-any.whl
  • Upload date:
  • Size: 47.7 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for agentra-0.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 53561f0e2cd1c6d1ca2e7e76df0b7b7f193ed978ec20d3ac327e62f5485a4f74
MD5 49ff92b1e52f5ca76ed2a6eeefe8964f
BLAKE2b-256 035f8f71e857d4992e7d05e13b8f5c26e398757a301a4f932172ad06ceb92f28

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page