Skip to main content

AI Agent Action Firewall core SDK

Project description

agsec

PyPI version Python 3.8+ License


Your AI agent has shell access. File access. Network access. Git access.

There are no guardrails by default.

AgSec is a policy engine for AI agents - like AWS IAM, but for what agents can do on your machine. Write declarative YAML policies. Every action gets checked at runtime before it executes. Deny always wins.

agent wants to act  →  agsec evaluates policy  →  allow / deny / review  →  real world

See it in action

Without agsec — Claude deletes files freely

Claude deletes files without guardrails

With agsec — dangerous action blocked

agsec blocks Claude from deleting files

agsec analyze — threat analysis

agsec analyze command


The problem

You give Claude Code, Cursor, or Codex access to your terminal. It tries to be helpful. Sometimes it runs rm -rf. Writes to .env. Force-pushes to main. Makes an API call you didn't expect.

It's not malicious. It's just that agents have no blast radius limit unless you give them one.

agsec is that limit.


3-command setup

pip install agsec
agsec init                    # scaffold default policies
agsec install claude-code     # activate the firewall

Done. Every tool call is now checked against your policies. Out of the box, the following are blocked:

  • rm, rm -rf, rmdir — destructive deletes
  • Reads and writes to .env, credentials, SSH keys, cloud credentials
  • git push --force, git reset --hard — destructive git
  • DROP TABLE, TRUNCATE, ALTER DROP — DDL commands
  • DELETE FROM, UPDATE SET, INSERT INTO — DML commands
  • sqlite3 audit.db, psql audit.db — audit database tampering
  • chmod 777, mkfs, dd, shred — destructive filesystem ops
  • Direct push to main, master, production branches

Not ready to block yet? Start in Observe Mode

agsec init --observe          # log everything, block nothing
agsec audit --stats           # see what would have been blocked
agsec enforce                 # start blocking when ready

Observe mode gives you a full audit trail of every action your agent attempted — with zero disruption to your workflow. See the blast radius before you enforce it. Every action is logged with its actual outcome, so agsec analyze accurately shows what got through vs what would have been blocked.


Write your own policies

version: "1.0"
default: deny

statements:
  - sid: "AllowReadOps"
    effect: allow
    actions: ["file.read", "file.glob", "file.grep"]

  - sid: "BlockDeletes"
    effect: deny
    actions: ["bash.execute"]
    conditions:
      params.command:
        op: "regex"
        value: "\\brm\\s"
    reason: "Agents should not delete files"

  - sid: "ReviewLargePayments"
    effect: review               # pause and ask a human
    actions: ["payment.create"]
    conditions:
      params.amount:
        op: "gt"
        value: 10000

  - sid: "AllowBash"
    effect: allow
    actions: ["bash.execute"]

Three effects: allow, deny, review (human-in-the-loop pause). Deny always wins — same evaluation logic as AWS IAM. Layered policy evaluation (project + agent layers) where each layer is a gate. 21 built-in threat patterns for blast radius analysis. Supports 14 condition operators: ==, !=, >, <, >=, <=, in, not_in, contains, starts_with, ends_with, regex, exists, not_exists.


Supported platforms

System agents — hook-based enforcement

agsec install claude-code     # Claude Code + Claude Cowork ✓ tested
agsec install codex           # OpenAI Codex
agsec install cursor          # Cursor
agsec install windsurf        # Windsurf (Codeium)
agsec install cline           # Cline
agsec install copilot         # GitHub Copilot (project + user level)

Claude Code and Claude Cowork are fully tested. Others are functional — community testing welcome.

Python frameworks

LangChain:

from agsec.integrations.langchain import guard, allow, deny, review, param

agent = create_react_agent(llm, guard(
    allow(search, calculator),
    review(send_email),
    deny(delete_record),
    deny(payment).when(param("amount") > 10000),
))

OpenAI / Anthropic / OpenRouter:

from agsec.integrations.openai import protect, deny, param

client = protect(OpenAI(),
    deny("delete_user"),
    deny("payment").when(param("amount") > 10000),
)
# Works with OpenRouter, Groq, Together — anything OpenAI-compatible

Any Python function:

from agsec import guard

@guard("email.send")
def send_email(to, subject, body):
    ...

CLI reference

agsec init [--observe]        # scaffold policies
agsec install <platform>      # activate firewall
agsec uninstall <platform>    # deactivate

agsec policy list             # view all rules
agsec policy add              # add a rule (interactive)
agsec policy remove <sid>     # remove a rule
agsec validate                # check for errors

agsec audit [--stats]         # view action log
agsec analyze [--hours N]     # threat analysis with blast radius
agsec analyze --all           # full activity report (every action)
agsec status                  # firewall status at a glance
agsec observe                 # switch to observe mode
agsec enforce                 # switch to enforce mode

agsec halt                    # kill switch: block ALL actions immediately
agsec resume                  # restore from halt

OWASP Agentic Top 10 coverage

agsec addresses 7 of the 10 OWASP Agentic Top 10 risks out of the box. See the full mapping.


Documentation


Contributing

See CONTRIBUTING.md. Issues and PRs welcome — especially platform testing reports for Codex, Cursor, Windsurf, and Cline.

License

Apache 2.0 — see LICENSE.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

agsec-0.2.2.tar.gz (81.0 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

agsec-0.2.2-py3-none-any.whl (101.0 kB view details)

Uploaded Python 3

File details

Details for the file agsec-0.2.2.tar.gz.

File metadata

  • Download URL: agsec-0.2.2.tar.gz
  • Upload date:
  • Size: 81.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.9.6

File hashes

Hashes for agsec-0.2.2.tar.gz
Algorithm Hash digest
SHA256 4e39d884f1183ab9cc79fe4d9f39866d9b2983e59a0ae46542bc0b91418a9aa4
MD5 e7a39c9eb0c049983a2bea54ff783bb8
BLAKE2b-256 7daf1fe5ebc92f460f11c621b405f6fb1718e9c5752fa3e4a2e3bb4a75f4e4bf

See more details on using hashes here.

File details

Details for the file agsec-0.2.2-py3-none-any.whl.

File metadata

  • Download URL: agsec-0.2.2-py3-none-any.whl
  • Upload date:
  • Size: 101.0 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.9.6

File hashes

Hashes for agsec-0.2.2-py3-none-any.whl
Algorithm Hash digest
SHA256 2cc89a84c4b91462fdc7eca5f4fa0d824e7a66610d2c6e88b7b805508f8fc6e2
MD5 a10af6ec59936f2a5c2f8520c44211b3
BLAKE2b-256 243815b509f29b56a123939f282bd43bbca69ec03612a69a1925066e5fe8a2df

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page