Skip to main content

Runtime governance for AI agents — deterministic fail-closed enforcement. Wraps any agent tool and blocks dangerous calls before execution. Zero LLM calls, zero cloud dependencies, works offline.

Project description

CapFence

Deterministic runtime authorization for AI agent tool calls.

PyPI version Python versions License: MIT Tests: passing

CapFence sits between AI agents and their tools. It evaluates every tool call against deterministic policy before execution, then allows it, blocks it, or requires approval.

It is closer to IAM, Open Policy Agent, API gateways, and admission controllers than prompt guardrails or moderation.

Agent -> CapFence -> Tool
          |
          +-- allow
          +-- deny
          +-- require approval

CapFence terminal demo

Why This Exists

Agents increasingly call tools that can move money, edit databases, run shell commands, read files, modify permissions, and operate SaaS admin APIs.

Prompt instructions are not an execution boundary. CapFence gives those tool calls an explicit runtime authorization layer:

  • No LLM call in the gate path.
  • Policy-as-code decisions.
  • Default-deny behavior when policy does not match.
  • Fail-closed handling for policy and audit failures.
  • Local audit logs with hash-chain verification.
  • Observe mode for safe rollout before enforcement.

Install

pip install capfence

60-Second Example

Create a policy:

deny:
  - capability: shell.execute
    contains: "rm -rf"

require_approval:
  - capability: payments.transfer
    amount_gt: 1000

allow:
  - capability: shell.execute
  - capability: payments.transfer
    amount_lte: 1000

Evaluate a tool call before execution:

from capfence.core.gate import Gate

gate = Gate()

result = gate.evaluate(
    agent_id="ops-agent",
    task_context="shell",
    risk_category="shell_execution",
    capability="shell.execute",
    policy_path="policies/shell_agent.yaml",
    payload={"command": "rm -rf /var/lib/postgresql"},
)

if not result.passed:
    raise PermissionError(f"Blocked: {result.reason}")

The dangerous command never reaches the tool.

Framework Integrations

CapFence can wrap tools in:

  • LangChain
  • LangGraph
  • CrewAI
  • OpenAI Agents SDK
  • MCP
  • PydanticAI
  • LlamaIndex
  • AutoGen
  • Direct Python runtimes

LangChain example:

from capfence import CapFenceTool
from langchain.tools import ShellTool

safe_shell = CapFenceTool(
    tool=ShellTool(),
    agent_id="ops-agent",
    capability="shell.execute",
    policy_path="policies/shell_agent.yaml",
)

CLI Workflows

Scan for ungated tools:

capfence check ./src --fail-on-ungated

Validate a policy:

capfence check-policy policies/shell_agent.yaml

Replay a trace through policy:

capfence simulate --trace-file traces/agent_trace.jsonl --compare

Verify audit-log integrity:

capfence verify --audit-log audit.db

Rollout Path

  1. Start in observe mode and log decisions without blocking.
  2. Review audit logs and tune policies.
  3. Enforce policy for high-risk tools.
  4. Add CI checks so new ungated tools cannot quietly ship.
  5. Replay incidents and policy changes against saved traces.

What CapFence Is Not

CapFence is a runtime authorization and audit layer. It does not replace:

  • sandboxing for shell/code execution
  • least-privilege credentials
  • network egress controls
  • prompt-injection defenses
  • human review for genuinely ambiguous high-risk actions

Use it as the deterministic control point before tool execution.

Why Not Prompt Guardrails?

Prompt guardrails are useful, but they do not enforce execution. A prompt can be bypassed, misinterpreted, or ignored under pressure. CapFence adds a deterministic enforcement boundary that blocks tool calls before they execute and records a tamper-evident audit trail.

Where It Sits In Your Stack

Agent framework -> CapFence gate -> Tool/API/DB/Shell

CapFence does not replace sandboxing, network egress controls, or least-privilege credentials. It complements them by enforcing runtime policy at the tool boundary.

Project Status

CapFence is beta infrastructure for agent tool governance. The repo includes:

  • deterministic gate and policy engine
  • local audit log with hash-chain verification
  • approval workflows
  • observe mode and bypass audit trails
  • framework adapters
  • MCP gateway and adapter
  • static scanner and CI mode
  • OWASP Agentic Top 10 and EU AI Act evidence reports
  • typed Python package with ruff, mypy, and pytest coverage

Current local verification: run pytest -q.

Documentation

Useful starting points:

Contributing

git clone https://github.com/capfencelabs/capfence-python.git
cd capfence-python
pip install -e ".[dev]"
pytest tests/ -q

Policy recipes, framework adapters, taxonomies, docs, and focused bug reports are welcome.

License

MIT License

Built by CapFence Labs

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

capfence-0.6.2.tar.gz (1.0 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

capfence-0.6.2-py3-none-any.whl (111.9 kB view details)

Uploaded Python 3

File details

Details for the file capfence-0.6.2.tar.gz.

File metadata

  • Download URL: capfence-0.6.2.tar.gz
  • Upload date:
  • Size: 1.0 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.4

File hashes

Hashes for capfence-0.6.2.tar.gz
Algorithm Hash digest
SHA256 5a206dc3f255c79c537191f915e8fa5aeef35c91455f5439b5510e2956d70382
MD5 28417651661a6270cd3d2fc3d34c7637
BLAKE2b-256 5d8d75a72f4eb44467af237eff0888a333589a33769038aa3a9137736b6e0983

See more details on using hashes here.

File details

Details for the file capfence-0.6.2-py3-none-any.whl.

File metadata

  • Download URL: capfence-0.6.2-py3-none-any.whl
  • Upload date:
  • Size: 111.9 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.4

File hashes

Hashes for capfence-0.6.2-py3-none-any.whl
Algorithm Hash digest
SHA256 f920395112f83b9829d4d8e3f724c36d6fab89ec8b75bf628bd58e506b686aec
MD5 f0ee4e07ab4409ba777c049fc01d4b79
BLAKE2b-256 74d7533027956a4719419bca479be74cda8113718ac204099d34b7b447320bd1

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page