AI Agent Action Firewall core SDK
Project description
agsec
AI Agent Action Firewall - A minimal, control layer for agent actions.
Overview
agsec provides a simple yet powerful way to add safety controls to AI agents. It acts as a "firewall" between agents and real-world actions, allowing you to define policies that approve, block, or review actions before execution.
Why agsec?
- Agent-neutral: Works with any agent framework (LangChain, custom, etc.)
- Declarative policies: Define rules in YAML or code
- Extensible: Plugin system for custom actions and policies
- Production-ready: Lightweight, fast, and secure
Features
- ✅ Action Registry: Register and manage agent actions
- ✅ Policy Engine: Flexible rule-based decision making
- ✅ YAML Policies: Human-readable policy definitions
- ✅ Context Awareness: Rules can access parameters and context
- ✅ Priority & Matching: Advanced rule evaluation (priority, all/any matching)
- ✅ Audit Logging: Built-in persistent audit store for compliance
- ✅ Async Support: Full async/await support for modern agent stacks
- ✅ Python Package: Easy installation via PyPI
Installation
Runtime (for users)
pip install agsec
Development (for contributors)
git clone https://github.com/riyandhiman14/Agent-Sec.git
cd agsec
pip install -e .[dev]
pre-commit install
Quick Start
Basic Usage
import asyncio
from agsec import ControlLayer
async def main():
# Create control layer
control = ControlLayer()
# Register an action (sync or async)
@control.register_action("send_email")
async def send_email(to, subject, body):
# Simulate async email sending
await asyncio.sleep(0.1)
return {"sent_to": to, "status": "success"}
# Execute with default allow policy
result = await control.execute("send_email", {"to": "user@example.com", "subject": "Hello", "body": "Hi!"})
print(result.result) # {"sent_to": "user@example.com", "status": "success"}
# View audit logs
executions = control.audit_store.get_executions()
print(f"Total executions: {len(executions)}")
asyncio.run(main())
With YAML Policies
import asyncio
from agsec import ControlLayer
async def main():
policy_yaml = """
rules:
- action: payment
status: block
reason: "High-value payment blocked"
conditions:
amount:
op: ">"
value: 10000
"""
control = ControlLayer(policy_yaml=policy_yaml)
@control.register_action("payment")
async def payment(amount):
await asyncio.sleep(0.1) # Simulate async payment processing
return {"charged": amount}
try:
await control.execute("payment", {"amount": 15000})
except Exception as e:
print(e) # PolicyViolationError: High-value payment blocked
asyncio.run(main())
API Reference
ControlLayer
Main class for managing agent actions and policies.
ControlLayer(
policy_engine=None, # PolicyEngine instance
action_registry=None, # ActionRegistry instance
logger=None, # Custom logger
policy_yaml=None, # YAML policy string
policy_yaml_path=None # Path to YAML policy file
)
Methods
register_action(name): Decorator to register an action function (supports both sync and async functions)async execute(action, params, context=None): Execute an action with policy check (async)
PolicyEngine
Handles policy evaluation.
Methods
add_rule(rule): Add a programmatic rule functionload_rules_from_yaml(yaml_text): Load rules from YAML stringload_rules_from_yaml_file(path): Load rules from YAML fileevaluate(action, params, context=None): Evaluate policy for action
AuditStore
Persistent storage for execution logs and compliance.
AuditStore(db_path="audit.db") # File-based, or ":memory:" for in-memory
Methods
log_execution(execution, context, error): Log an execution resultget_executions(action, limit, offset): Query execution historyget_execution_stats(): Get summary statisticsexport_to_json(file_path): Export logs to JSON
YAML Policy Schema
rules:
- action: "action_name" # Action to match (* for all)
status: "allow|block|review" # Decision
reason: "Optional reason" # Human-readable explanation
priority: 0 # Higher = evaluated first
match: "all|any" # Condition matching mode
conditions: # Parameter/context checks
param_name:
op: "==|!=|>|<|>=|<=|in|not_in"
value: "expected_value"
context.user_role:
op: "=="
value: "admin"
Development
Setup
pip install -e .[dev]
pre-commit install
Testing
pytest
Building
python -m build
Error Handling
agsec provides a comprehensive exception hierarchy for robust error handling in production environments. All exceptions inherit from AgsecError and include structured error codes and detailed context.
Exception Hierarchy
AgsecError (base)
├── ConfigurationError
│ ├── InvalidConfigError
│ ├── MissingConfigError
│ └── ConfigValidationError
├── RegistryError
│ ├── ActionNotFoundError
│ ├── DuplicateActionError
│ ├── InvalidActionError
│ └── RegistryFullError
├── PolicyError
│ ├── PolicyParseError
│ ├── InvalidPolicyError
│ ├── PolicyConflictError
│ ├── PolicyTimeoutError
│ └── PolicyViolationError
├── ActionExecutionError
├── AuditError
│ ├── AuditConnectionError
│ ├── AuditIntegrityError
│ └── AuditStorageError
├── ValidationError
│ ├── ParameterValidationError
│ ├── TypeValidationError
│ └── SchemaValidationError
├── SecurityError
│ ├── SecurityViolationError
│ ├── TamperingError
│ └── IntegrityError
├── InitializationError
│ ├── DependencyError
│ └── EnvironmentError
└── RuntimeError
├── TimeoutError
├── ResourceError
└── ConcurrencyError
Error Handling Example
from agsec import ControlLayer
from agsec.exceptions import (
PolicyViolationError,
ActionExecutionError,
ConfigurationError
)
control = ControlLayer()
try:
result = control.execute("payment", {"amount": 10000})
except PolicyViolationError as e:
print(f"Policy blocked: {e.details['reason']}")
# Handle policy violation
except ActionExecutionError as e:
print(f"Action failed: {e.details['original_error']}")
# Handle execution error
except ConfigurationError as e:
print(f"Config error: {e.details}")
# Handle configuration issues
Error Details
All exceptions provide:
- Error code: Machine-readable identifier (e.g.,
"POLICY_VIOLATION") - Structured details: Context-specific information in
detailsdict - Descriptive message: Human-readable error description
Common error codes:
ACTION_NOT_FOUND: Action not registeredPOLICY_VIOLATION: Policy blocked the actionACTION_EXECUTION_ERROR: Action execution failedINVALID_CONFIG: Configuration file invalidDEPENDENCY_ERROR: Required dependency missingTIMEOUT_ERROR: Operation timed out
Contributing
- Fork the repository
- Create a feature branch
- Make your changes
- Add tests
- Run
pre-commit run --all-files - Submit a pull request
Code Style
- Black for formatting
- isort for import sorting
- flake8 for linting
- pytest for testing
Roadmap
- Advanced risk scoring
- Multi-agent coordination
Support
- Issues: GitHub Issues
- Discussions: GitHub Discussions
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file agsec-0.1.3.tar.gz.
File metadata
- Download URL: agsec-0.1.3.tar.gz
- Upload date:
- Size: 38.6 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.9.6
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
b2d43b4a968b7ff4f279653b348c3ba57c43f92372f058de29b850c7842d68ab
|
|
| MD5 |
3906151645276a4e39ac7164dcfdd952
|
|
| BLAKE2b-256 |
598577284c2d76fe862e5ff56c86eaab16b3f464551ca5a01efd54c85017cd99
|
File details
Details for the file agsec-0.1.3-py3-none-any.whl.
File metadata
- Download URL: agsec-0.1.3-py3-none-any.whl
- Upload date:
- Size: 45.9 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.9.6
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
c0191a8d1686bf8881f4ff649e584ad67100efc1f27b53ef9effb009870738a8
|
|
| MD5 |
b604bb969a7ab1f7b325ab66b29a98f6
|
|
| BLAKE2b-256 |
1b443039ff25efe838a5af42889c2c3d7ab9e3392057405c61a899ce829c8539
|