Skip to main content

Interven AI firewall — Python SDK. Scan agent tool calls before they execute. Block malicious requests, redact PII/secrets, route risky actions to human approval.

Project description

interven

Python SDK for the Interven AI firewall. Scan agent tool calls before they execute — block malicious requests, redact PII and secrets, and route risky actions to human approval.

pip install interven

Quickstart

from interven import Client

client = Client(api_key="iv_live_...")  # or set INTERVEN_API_KEY env

result = client.scan(
    method="POST",
    url="https://slack.com/api/chat.postMessage",
    body={"text": "Customer SSN 478-23-9156, email john@acme.com"},
)

if result.decision == "ALLOW":
    send_to_slack(original_body)
elif result.decision == "SANITIZE":
    send_to_slack(result.sanitized_body)        # PII redacted
elif result.decision == "REQUIRE_APPROVAL":
    poll_approval(result.approval_id)
else:
    log_blocked(result.reason_codes)

That's it. Get an API key at intervensecurity.com (free tier: 1,000 scans/month).

Decisions

Decision What to do Helper
ALLOW Forward the original request result.allowed
DENY Block the call. reason_codes explain why. result.blocked
SANITIZE Forward result.sanitized_body instead of the original — secrets/PII redacted result.needs_sanitization
REQUIRE_APPROVAL Pause; poll /approvals/{id}/status until decided result.needs_approval

Configuration

Argument Env var Default
api_key INTERVEN_API_KEY — (required)
gateway_url INTERVEN_GATEWAY_URL https://api.intervensecurity.com
timeout 30.0
agent_id unset (server uses default)
runtime_type "python"

Framework recipes

LangChain — callback handler

from langchain_core.callbacks import BaseCallbackHandler
from interven import Client

interven = Client(runtime_type="langchain")

class IntervenCallback(BaseCallbackHandler):
    def on_tool_start(self, serialized, input_str, **kwargs):
        url = serialized.get("kwargs", {}).get("url")
        if not url:
            return
        result = interven.scan(method="GET", url=url)
        if result.decision == "DENY":
            raise RuntimeError(f"Blocked by Interven: {result.reason_codes}")

CrewAI — step callback

from interven import Client
from crewai import Agent

interven = Client(runtime_type="crewai")

def step_guard(step):
    for call in step.tool_calls:
        result = interven.scan(
            method="POST",
            url=call.tool_url,
            body=call.payload,
        )
        if result.blocked:
            raise RuntimeError(f"Interven blocked: {result.reason_codes}")

agent = Agent(role="...", goal="...", step_callback=step_guard)

MCP server — middleware

from interven import Client
from your_mcp_server import MCPServer

interven = Client(runtime_type="mcp")
server = MCPServer()

@server.tool_middleware
async def scan_before_call(tool_name, params, next_handler):
    result = interven.scan(
        method="POST",
        url=f"mcp://{tool_name}",
        body=params,
    )
    if result.blocked:
        raise RuntimeError(f"Blocked: {result.reason_codes}")
    return await next_handler(tool_name, params)

Generic agent

Wrap any outbound HTTP call. Works with AutoGen, OpenAI Assistants, custom agents.

import requests
from interven import Client

interven = Client()

def safe_post(url, json=None):
    r = interven.scan(method="POST", url=url, body=json or {})
    if r.blocked:
        raise RuntimeError(f"Blocked: {r.reason_codes}")
    body = r.sanitized_body if r.needs_sanitization else json
    return requests.post(url, json=body)

Errors

from interven import (
    AuthenticationError,      # bad / revoked API key
    GatewayError,             # network or 5xx
    PayloadTooLargeError,     # >256KB body
)

try:
    client.scan(method="POST", url="...", body={...})
except AuthenticationError:
    rotate_key()
except PayloadTooLargeError:
    chunk_payload()
except GatewayError as e:
    log_and_fail_open(e)

Legacy: HMAC AifClient

The original HMAC-signed /invoke flow is still supported for existing customers. New integrations should prefer Client — fewer required fields, no shared secret to manage.

from interven import AifClient, InvokeParams

client = AifClient(
    gateway_url="http://localhost:4000",
    agent_id="00000000-0000-0000-0000-000000000010",
    agent_name="release-bot",
    agent_secret="...",
)

result = client.invoke(InvokeParams(
    tool_name="github",
    method="PUT",
    url_path="/repos/acme/main-app/collaborators/external-user",
    credential_type="pat",
    credential_token="ghp_...",
    scopes=["repo"],
))

The HMAC path supports approval polling (client.poll_approval, client.wait_for_approval, client.execute_approval) and the full event envelope. See the HMAC docs for details.

License

MIT © Interven Security

Links

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

interven-0.5.1.tar.gz (22.2 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

interven-0.5.1-py3-none-any.whl (19.1 kB view details)

Uploaded Python 3

File details

Details for the file interven-0.5.1.tar.gz.

File metadata

  • Download URL: interven-0.5.1.tar.gz
  • Upload date:
  • Size: 22.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.11.1

File hashes

Hashes for interven-0.5.1.tar.gz
Algorithm Hash digest
SHA256 818fd34be19d76dcf240062397b021923e652f094547e1a9a429eb709c0fbc40
MD5 af40b8b32a08d82c4c499f9f1e81ea81
BLAKE2b-256 f59997b674e072c9a295f50471fcba774bb7685bdc1cc6ced74d8cd04f9fb7c1

See more details on using hashes here.

File details

Details for the file interven-0.5.1-py3-none-any.whl.

File metadata

  • Download URL: interven-0.5.1-py3-none-any.whl
  • Upload date:
  • Size: 19.1 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.11.1

File hashes

Hashes for interven-0.5.1-py3-none-any.whl
Algorithm Hash digest
SHA256 c73f02d63143bf66b722a501bdceed8af7b84daf95b0aed81bb893fcd8519c81
MD5 0a40a7e9a6705e0761bcb1e627bdb345
BLAKE2b-256 515afde7dc06c0a48ed9e6bdcb16c86c0dad5667aa80b72e36a79b6997d38149

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page