Enterprise AI Engineering Control Plane — secure, token-optimized, context-aware governance for coding agents.
Project description
Agentra
Enterprise AI Engineering Control Plane
Secure, govern, and optimize AI coding agents — automatically.
Agentra is a DevSecOps control plane for AI coding assistants. It auto-detects your project stack, enforces 21 security policies across 7 categories, manages context token budgets, and generates tailored instruction files for every major agent platform.
| 40+ Technologies Detected | 21 Security Policies | 14 Built-in Skills |
| 7 Agent Platforms | 5 Compliance Frameworks | 11 CLI Commands |
Quick Start
# Install
pip install agentra
# Initialize — auto-detect stack, generate agent instruction files
ag init --mode quick
# Run security governance checks
ag enforce
# Check a command before running it
ag simulate "rm -rf /tmp/build"
# Run benchmarks and generate reports
ag benchmark
Features
| Feature | Description |
|---|---|
| 🔍 Stack Detection | Auto-detect languages, frameworks, databases, cloud providers, CI/CD, and agents with confidence scores |
| 🛡 Security Governance | 21 policies across database, execution, secret, git, infrastructure, prompt injection, and runtime categories |
| 🧩 Skills System | 14 domain skills (FastAPI, Terraform, K8s, Spark, Airflow, PostgreSQL, Snowflake, dbt, Kafka, OpenAI, LangChain, MCP, Databricks, Karpathy) |
| 📦 Token Optimization | Deduplicate, prioritize, compress, and budget-fit instructions — 30-60% token savings |
| 🔌 Agent Adapters | Native instruction files for Claude, Cursor, Copilot, Aider, Windsurf, Continue.dev, and universal AGENTS.md |
| ⚙ Execution Safety | Risk-classify commands, block destructive patterns, sandbox with approval gates, dry-run mode |
| ✓ Compliance | Map violations to SOC2, ISO27001, PCI DSS, HIPAA, NIST frameworks |
| 📊 Benchmarking | Before/after metrics for every skill with HTML + Markdown report generation |
CLI Commands
| Command | Description |
|---|---|
ag init |
Initialize project — detect stack, save config, generate agent files |
ag detect |
Scan and display detected technologies with confidence scores |
ag enforce |
Run security policies against codebase, report violations with risk scoring |
ag optimize |
Show token optimization analysis: deduplication, compression, budget fitting |
ag simulate <cmd> |
Dry-run a command through the execution safety engine |
ag explain <rule> |
Display full details of a security policy (e.g., ag explain SEC-001) |
ag validate |
Full pipeline: governance + compliance + optimization in one command |
ag benchmark |
Run skill benchmarks, generate Markdown + HTML reports |
ag audit |
View local audit log of all Agentra actions |
ag doctor |
Health check: verify config, agent files, .gitignore |
ag version |
Display version |
Usage Examples
# Enterprise mode with SOC2 + ISO27001 compliance
ag init --mode enterprise --agents claude,copilot
# Explain a specific policy rule
ag explain DB-001
# DB-001 — no-auto-drop
# Severity: CRITICAL │ Category: database
# Never auto-execute DROP TABLE/DATABASE without explicit approval
# Full validation pipeline
ag validate
# Governance: 4 violations │ Risk: 29.0 │ Blast Radius: high
# Compliance: SOC2: 3 findings │ PCI_DSS: 2 findings
# Optimization: 3,840 → 2,112 tokens (45.0% reduction)
Security Policies
21 built-in policies across 7 categories:
| Category | Policies | Key Rules |
|---|---|---|
| Database | DB-001, DB-002, DB-003 | No auto-DROP, no unguarded mutations, require rollback plans |
| Execution | EX-001 – EX-004 | No inline shell, no curl|bash, no eval/exec, no rm -rf |
| Secrets | SEC-001 – SEC-003 | No hardcoded secrets, no key logging, no secret persistence |
| Git | GIT-001 – GIT-003 | No force push, no main commits, no secret commits |
| Infrastructure | INF-001 – INF-003 | No public resources, no wildcard IAM, require encryption |
| Prompt Injection | PI-001 – PI-003 | Detect injection, hidden injections, validate external instructions |
| Runtime | RT-001, RT-002 | No debug in prod, require error handling |
Agent Adapters
Generates native instruction files for each platform:
| Platform | Output File | Format |
|---|---|---|
| Claude | CLAUDE.md |
Markdown |
| Cursor | .cursorrules |
Markdown |
| GitHub Copilot | .github/copilot-instructions.md |
Markdown |
| Aider | .aider.conf.yml |
YAML |
| Windsurf | .windsurfrules |
Markdown |
| Continue.dev | .continue/config.json |
JSON |
| Universal | AGENTS.md |
Markdown |
Architecture
agentra/
├── cli/ # Typer CLI with Rich output
├── detection/ # Stack detection engine (40+ technologies)
├── governance/ # Security policy engine (21 rules, 7 categories)
├── optimizer/ # Token optimization (dedup, prioritize, compress, budget-fit)
├── adapters/ # Agent platform adapters (7 platforms)
├── skills/ # Domain skill packs (14 built-in)
├── execution/ # Execution safety engine (risk classify, sandbox, approve)
├── onboarding/ # Project initialization (4 modes)
├── compliance/ # Compliance mapping (SOC2, ISO27001, PCI DSS, HIPAA, NIST)
├── benchmarks/ # Skill benchmarking with before/after metrics
├── renderers/ # HTML + Markdown report generation
├── risk/ # Risk scoring and blast radius estimation
├── telemetry/ # Local-only JSON audit logging
└── models.py # Pydantic data models
Onboarding Modes
| Mode | Security | Compliance | Token Budget | Best For |
|---|---|---|---|---|
quick |
Standard | — | 12k / 4k / 2k | Fast dev setup |
guided |
Strict | All 5 frameworks | 12k / 4k / 2k | Interactive comprehensive |
enterprise |
Enterprise | SOC2 + ISO27001 | 16k / 6k / 3k | Production deployments |
ci |
Standard | — | 8k / 3k / 1.5k | CI/CD pipelines |
Benchmarking & Reports
Every skill is benchmarked with before/after metrics:
- Instruction Token Cost — tokens consumed by skill instructions
- Security Policy Coverage — policies activated by the skill
- Context Relevance — stack-match relevance score (0–1)
- Instruction Compression — compression ratio achieved
ag benchmark --output reports/
# ✓ Benchmark report (MD): reports/benchmark-report.md
# ✓ Benchmark report (HTML): reports/benchmark-report.html
The HTML report is a self-contained dark-themed dashboard with stat cards, metric bars, and tables. Open it directly in a browser.
Configuration
Agentra uses .agentra.yml:
project:
name: my-project
languages: [python]
frameworks: [fastapi]
sdks: [openai]
security:
mode: enterprise
edr_safe: true
compliance: [SOC2, ISO27001]
optimization:
minimal_context: true
token_budget:
input: 12000
output: 4000
agents: [claude, copilot, cursor]
skills: [fastapi, postgresql, karpathy]
Documentation
Full interactive documentation is available at docs/index.html — a storybook-style guide covering every feature, command, policy, skill, and adapter with usage examples. A Markdown version is at docs/index.md.
Development
# Install dev dependencies
pip install -e ".[dev]"
# Run tests (72 tests)
pytest tests/ -v
# Lint
ruff check agentra/
# Type check
mypy agentra/
Acknowledgements
This project was inspired by agent-policykit by Siddharth Rathore. Thanks for the idea and the foundational work that sparked Agentra.
License
MIT
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file agentra-0.1.0.tar.gz.
File metadata
- Download URL: agentra-0.1.0.tar.gz
- Upload date:
- Size: 48.8 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
8957e2f8a17554da57f13491e4b951f31f57a1b56d4c0d81cfea87b8506aa9ab
|
|
| MD5 |
6abf1079f94514489f4003e013246900
|
|
| BLAKE2b-256 |
08caf49e90065f984851c0d83fb03a05da4c393062abce7fc7590bbe968abef9
|
File details
Details for the file agentra-0.1.0-py3-none-any.whl.
File metadata
- Download URL: agentra-0.1.0-py3-none-any.whl
- Upload date:
- Size: 47.7 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
53561f0e2cd1c6d1ca2e7e76df0b7b7f193ed978ec20d3ac327e62f5485a4f74
|
|
| MD5 |
49ff92b1e52f5ca76ed2a6eeefe8964f
|
|
| BLAKE2b-256 |
035f8f71e857d4992e7d05e13b8f5c26e398757a301a4f932172ad06ceb92f28
|