A fact-forcing hook gate for Claude Code. Makes the AI pause and investigate before editing.
Project description
GateGuard
A fact-forcing hook gate for Claude Code.
GateGuard makes Claude Code pause and investigate before it edits your files. When Claude tries to modify, create, or run something, the gate blocks the first attempt and forces Claude to present concrete facts — who imports this file, what the data actually looks like, what the user's instruction was — before it is allowed to proceed.
Self-evaluation ("are you sure?") doesn't change LLM behavior. Forced investigation does. GateGuard is the smallest thing that reliably moves that needle.
Evidence: A/B test results
We ran two identical Claude Code agents on the same task — one with GateGuard, one without. Two independent tasks, scored on a 10-point rubric (code structure, edge cases, pattern compliance, test quality, design decisions).
| Task | With GateGuard | Without GateGuard | Gap |
|---|---|---|---|
| Analytics module (codebase integration) | 8.0 / 10 | 6.5 / 10 | +1.5 |
| Webhook validator (data parsing) | 10.0 / 10 | 7.0 / 10 | +3.0 |
| Average | 9.0 | 6.75 | +2.25 |
The gated agent was forced to read existing code before writing — so it matched project patterns, discovered integration points, and handled edge cases that the ungated agent missed entirely. Both agents produced code that runs and passes tests. The difference is design depth: the ungated agent guesses; the gated agent investigates.
These are the errors tests don't catch: the code runs, but the design is shallow. Over a multi-file project, this 2+ point gap compounds into significant rework.
Install
pip install gateguard-ai
Quick start
From the project directory you want to protect:
gateguard init
This does three things:
- Writes
.gateguard.ymlinto the current directory. - Registers a
PreToolUsehook in~/.claude/settings.jsonthat runsgateguard-hookon everyEdit,Write, andBashcall. - Registers a
PostToolUsehook that tracks which files have beenRead(needed for the Read-before-Edit gate).
Restart Claude Code and the gate is active.
What the gates do
| Gate | Trigger | What Claude must do |
|---|---|---|
| Read-before-Edit | Edit on a file not yet Read this session |
Read the file first |
| Fact-force Edit | First Edit per file |
List importers, affected public API, verify data schemas from real records, quote the user's instruction |
| Fact-force Write | First Write per file |
Name call sites, confirm no duplicate exists, verify data schemas, quote the instruction |
| Fact-force destructive Bash | rm -rf, git reset --hard, drop table, etc. |
List what will be destroyed, give a rollback, quote the instruction |
| Fact-force routine Bash | First Bash per session |
Quote the user's current instruction |
Each gate fires once per target per session. After the facts are presented, the next attempt passes through.
Why "verify data schemas"?
In our A/B test, both agents (gated and ungated) wrote code that assumed
ISO-8601 dates and bare JSON arrays. The real data used %Y/%m/%d %H:%M dates
and {"schema_version": "1.0", "items": [...]} wrappers. Both agents got this
wrong — because neither actually looked at the data.
v0.2.0 adds a new gate item: "If this file reads/writes data files, cat one real record and show the actual field names, structure, and date format." This forces the LLM to verify assumptions against reality before writing code.
Configuration
gateguard init writes a .gateguard.yml you can edit:
enabled: true
gates:
read_before_edit: true
fact_force_edit: true
fact_force_write: true
fact_force_bash_destructive: true
fact_force_bash_routine: true
destructive_bash_extra:
- "supabase db reset"
- "prisma migrate reset"
messages:
edit: |
Before editing {file_path}, present:
1. ...
ignore_paths:
- ".venv/**"
- "node_modules/**"
- ".git/**"
CLI
gateguard init [path] [--force] [--skip-hook]
gateguard logs [--tail N]
gateguard reset
gateguard --version
init— write.gateguard.ymland register both hookslogs— print recent gate events from~/.gateguard/gate_log.jsonlreset— clear the in-session state (~/.gateguard/.session_state.json)
How it works
The core insight: asking an LLM to evaluate itself ("did you violate any
policies?") doesn't change its behavior. It always says no. But asking it to
gather facts — "list every file that imports this module" — forces it to use
Grep and Read. The act of investigation creates awareness that the
self-evaluation never did.
Every competitor in the AI guardrails space stops at deny. GateGuard does deny + force investigation + demand evidence. The model can't proceed until it has demonstrated understanding.
GateGuard is a Claude Code PreToolUse hook that:
- Denies the first attempt at Edit/Write/Bash
- Tells the model exactly which facts to gather (importers, public API, data schemas, user instruction)
- Allows the retry after facts are presented
The second attempt succeeds — but now the model has context it didn't have before, producing measurably better code.
Spread via CLAUDE.md
Add this line to your project's CLAUDE.md to make GateGuard available to every Claude Code user who works on your repo:
## Code quality gate
This project uses GateGuard. Run `pip install gateguard-ai && gateguard init` before starting work.
Anyone who opens Claude Code in your repo will see this instruction automatically.
License
MIT — see LICENSE.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file gateguard_ai-0.3.0.tar.gz.
File metadata
- Download URL: gateguard_ai-0.3.0.tar.gz
- Upload date:
- Size: 18.6 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.14.3
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
df33e32e72a57ec9e7bbd214be2683ec2aa5c02ba33a64b348d734206a4ac268
|
|
| MD5 |
38dca9b257a8ee37af7afe62e79fd9f1
|
|
| BLAKE2b-256 |
98ac392c84a47ff277b0c8fa61f1eacfd1a4c1c426434681fe79f442b517dbaa
|
File details
Details for the file gateguard_ai-0.3.0-py3-none-any.whl.
File metadata
- Download URL: gateguard_ai-0.3.0-py3-none-any.whl
- Upload date:
- Size: 15.7 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.14.3
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
209021291fcaf4d47790c7193f41b2d993a11b1ab97c112b3a440a03b5a261e0
|
|
| MD5 |
5d610be39618fbb1144735e7e2621e10
|
|
| BLAKE2b-256 |
730f5fb22a6bda805f795e4bdcb2f11ead51cf8c621aeb12c50e8cfd14e0406b
|