Pre-execution authority enforcement system for AI agents
Project description
Pre-execution authority enforcement for AI agents
Overview
Caracal is a pre-execution authority enforcement system for AI agents and automated software operating in production environments. It exists at the exact boundary where decisions turn into irreversible actions such as API calls, database writes, deployments, workflow triggers, financial operations, or any action that can create real impact. Instead of relying on standing credentials, broad roles, or static permissions, Caracal enforces a single rule: no action executes unless there is explicit, valid authority for that action at that moment.
Quickstart
Caracal offers two distinct interfaces depending on your role and requirements.
1. Caracal Flow (Default)
Target: Operators, FinOps, and Monitoring Teams.
Caracal Flow is the interactive Terminal User Interface (TUI). It provides a visual dashboard for monitoring agent swarms, managing infrastructure, and auditing real-time spend without writing code.
╔═══════════════════════════════════════════════════════════════════╗
║ ║
║ ██████╗ █████╗ ██████╗ █████╗ ██████╗ █████╗ ██╗ ║
║ ██╔════╝██╔══██╗██╔══██╗██╔══██╗██╔════╝██╔══██╗██║ ║
║ ██║ ███████║██████╔╝███████║██║ ███████║██║ ║
║ ██║ ██╔══██║██╔══██╗██╔══██║██║ ██╔══██║██║ ║
║ ╚██████╗██║ ██║██║ ██║██║ ██║╚██████╗██║ ██║███████╗ ║
║ ╚═════╝╚═╝ ╚═╝╚═╝ ╚═╝╚═╝ ╚═╝ ╚═════╝╚═╝ ╚═╝╚══════╝ ║
║ ║
║ C A R A C A L F L O W ║
║ Economic Control Plane for AI Agents ║
║ ║
╚═══════════════════════════════════════════════════════════════════╝
Launch Dashboard:
uv run caracal-flow
Capabilities in Flow:
- Visual Metering: Real-time graphs of token usage and dollar spend.
- One-Click Infrastructure: Toggle between local SQLite and production Docker stacks.
- Policy Management: GUI-based adjustments for agent budget caps.
2. Caracal Core (Power Users)
Target: Developers, CI/CD Engineers, and System Architects.
Caracal Core provides the high-performance CLI and SDK for deep integration. It is designed for users who require programmatic control, custom scripting, or wish to embed economic safety checks directly into agent loops.
Installation:
git clone https://github.com/Garudex-Labs/caracal.git
cd caracal
pip install -e .
CLI Commands:
# Register a new agent identity with a hard budget cap
caracal agents register --name "researcher-01" --budget 50.00 --zone "dev-cluster"
# Generate a dynamic access token for a specific session
caracal auth token --agent "researcher-01" --ttl 3600
# Audit the ledger for specific transactions
caracal ledger audit --agent "researcher-01" --format json
Advanced Configuration:
Power users can override default behaviors by modifying caracal.yaml or setting environment variables for custom identity providers (IdP) and key management systems (KMS).
Core Capabilities
Dynamic Identity & Access Move beyond static API keys. Caracal issues ephemeral, identity-attested credentials that can be revoked instantly. Authorization happens at the edge where agents interact with their environment.
Budget Enforcement Define hard caps on token usage, dollar spend, and transaction frequency per agent identity. Policies are deterministic and enforced at the gateway level before any cost is incurred.
Secure Ledger An immutable audit trail for every economic decision made by an agent. This system of record allows companies to attribute costs to specific agents, explain outcomes, and ensure compliance.
Agent-Native Data Model Map workloads into logical, ephemeral zones. Spin zones up or down as needed, perfect for dynamic, agent-native workloads that integrate directly into your software development lifecycle.
Infrastructure
Caracal is designed to scale with your agent fleet.
| Environment | Database | Messaging | Cache | Use Case |
|---|---|---|---|---|
| Local | SQLite | In-Memory | Local Dict | Zero-setup dev, testing, and Caracal Flow default. |
| Production | PostgreSQL | Kafka | Redis | High-throughput enterprise deployment. |
To enable production mode:
- Open
caracal-flow. - Navigate to Settings & Config > Infrastructure Setup.
- Select Start All Services (provisions containers via Docker).
Project Structure
caracal/core/: Business logic for budgeting, identity, and ledger operations.caracal/flow/: TUI layer for the visual dashboard.caracal/gateway/: Policy enforcement proxy and middleware.deploy/: Infrastructure definitions (Docker Compose, Helm).
License
Caracal is open-source software licensed under the AGPL-3.0. See the LICENSE file for full details.
Developed by Garudex Labs.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file caracal_core-0.5.0.tar.gz.
File metadata
- Download URL: caracal_core-0.5.0.tar.gz
- Upload date:
- Size: 354.3 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.14.2
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
cc9cf07e47f1d76feb02379f56aa61f0eb7550662111ba441c658c4a663795e2
|
|
| MD5 |
f2e1b816c33044e345ee900cabe5000b
|
|
| BLAKE2b-256 |
493803fa8ac13b0e5ccf405196b53ddd13374c089cef8374fef2207b55d66685
|
File details
Details for the file caracal_core-0.5.0-py3-none-any.whl.
File metadata
- Download URL: caracal_core-0.5.0-py3-none-any.whl
- Upload date:
- Size: 409.9 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.14.2
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
f1c0c9eecaee16c208152f828b3a93877bcda598e71968903262f4b94db932c4
|
|
| MD5 |
0a07166ba9693eb13342bedcb4ad8d24
|
|
| BLAKE2b-256 |
ad4890e6b2b88e8baedd5d4663e2db9cecf8653608168112b5a8fad58c38a5ee
|