Skip to main content

Governance components for Langflow — policy enforcement, trust routing, audit logging, and compliance checking for visual AI flows

Project description

langflow-agentmesh

Governance components for Langflow — policy enforcement, trust-based routing, audit logging, and compliance checking for visual AI flows.

Part of the AgentMesh ecosystem.

What This Does

Adds governance guardrails to Langflow flows as custom components. Each component can be dropped into a flow to enforce policies, route by trust, log decisions, and validate compliance — without writing code.

Component Purpose Key Feature
Governance Gate Policy enforcement Tool allowlist/blocklist, content pattern scanning
Trust Router Trust-based routing Three outputs: trusted / review / blocked
Audit Logger Tamper-evident logging SHA-256 hash chain, JSONL export
Compliance Checker Framework validation EU AI Act, SOC2, HIPAA

Install

pip install langflow-agentmesh

With Langflow:

pip install langflow-agentmesh[langflow]

Quick Start

Governance Gate

from langflow_agentmesh import GovernanceComponent

gate = GovernanceComponent(
    allowed_tools=["search", "read_file"],
    blocked_patterns=[("rm -rf", "substring"), (r".*password.*=.*", "regex")],
    max_calls=10,
)

result = gate.process(
    action="search",
    parameters={"query": "python tutorials"},
    agent_id="agent-1",
)
print(result.allowed)  # True

Trust Router

from langflow_agentmesh import TrustRouter

router = TrustRouter(trusted_threshold=0.7, review_threshold=0.3)

# Build trust through successful actions
router.record_success("agent-1", dimensions=["reliability", "security"])

# Route based on trust
result = router.route("agent-1", payload={"task": "deploy"})
print(result.decision.value)  # "review" or "trusted"

# Three outputs for Langflow flow branching
trusted_data = router.get_trusted_output(result)
review_data = router.get_review_output(result)
blocked_data = router.get_blocked_output(result)

Audit Logger

from langflow_agentmesh import AuditLogger

logger = AuditLogger()
logger.log("agent-1", "search", "allowed", context={"query": "data"})
logger.log("agent-2", "delete", "blocked", context={"reason": "policy"})

# Verify chain integrity
assert logger.verify_chain()

# Export for compliance
logger.export_jsonl_to_file("audit-trail.jsonl")

Compliance Checker

from langflow_agentmesh import ComplianceChecker, ComplianceFramework

checker = ComplianceChecker(frameworks=[
    ComplianceFramework.EU_AI_ACT,
    ComplianceFramework.SOC2,
    ComplianceFramework.HIPAA,
])

result = checker.check(
    action="classify",
    parameters={"data": "patient records"},
    agent_id="agent-1",
    context={"domain": "employment", "audit_enabled": True},
)

print(result.compliance_status.value)  # "requires_review"
for action in result.required_actions:
    print(f"  → {action}")

YAML Policy

# governance-policy.yaml
max_tool_calls_per_request: 10
confidence_threshold: 0.8
allowed_tools:
  - search
  - read_file
blocked_tools:
  - delete
  - drop
blocked_patterns:
  - pattern: "rm -rf"
    type: substring
  - pattern: ".*password.*=.*"
    type: regex
from langflow_agentmesh import GovernanceComponent

gate = GovernanceComponent(policy_yaml=open("governance-policy.yaml").read())

Example Langflow Flow

┌─────────────┐     ┌──────────────────┐     ┌──────────────┐
│  LLM Agent  │────▶│ Governance Gate  │────▶│ Trust Router  │
└─────────────┘     └──────────────────┘     └──┬───┬───┬───┘
                                                 │   │   │
                          ┌──────────────────────┘   │   └──────────┐
                          ▼                          ▼              ▼
                   ┌─────────────┐         ┌──────────────┐  ┌──────────┐
                   │  Tool Exec  │         │ Human Review │  │  Blocked │
                   └──────┬──────┘         └──────────────┘  └──────────┘
                          │
                          ▼
                   ┌─────────────────┐     ┌────────────────────┐
                   │  Audit Logger   │────▶│ Compliance Checker │
                   └─────────────────┘     └────────────────────┘

Compliance Frameworks

EU AI Act

  • Article 5: Blocks unacceptable-risk AI practices (social scoring, subliminal manipulation)
  • Article 13: Requires transparency notices for high-risk AI systems
  • Article 14: Requires human oversight for high-risk domains (employment, education, law enforcement)

SOC2

  • CC6.1: Requires agent identity for logical access control
  • CC7.2: Requires audit logging for system monitoring
  • CC8.1: Requires change approval for sensitive actions (delete, deploy, modify)

HIPAA

  • §164.502: Detects PHI (SSN, MRN, DOB, email) and requires encryption
  • §164.502(b): Enforces minimum necessary data scope
  • §164.312(b): Requires access logging for PHI operations

License

Apache-2.0

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

langflow_agentmesh-3.5.0.tar.gz (16.5 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

langflow_agentmesh-3.5.0-py3-none-any.whl (17.0 kB view details)

Uploaded Python 3

File details

Details for the file langflow_agentmesh-3.5.0.tar.gz.

File metadata

  • Download URL: langflow_agentmesh-3.5.0.tar.gz
  • Upload date:
  • Size: 16.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: RestSharp/106.13.0.0

File hashes

Hashes for langflow_agentmesh-3.5.0.tar.gz
Algorithm Hash digest
SHA256 057441c7032df917187d21676fc07bcaa83398a5f57b3bf15a7016177798ab86
MD5 01e451c7a915b32355937af614dc26a6
BLAKE2b-256 b7844e5b88ecc2ebb0b07a31b94604c8db2f67c22e6e0248a114e835f771df5d

See more details on using hashes here.

File details

Details for the file langflow_agentmesh-3.5.0-py3-none-any.whl.

File metadata

File hashes

Hashes for langflow_agentmesh-3.5.0-py3-none-any.whl
Algorithm Hash digest
SHA256 3134811dfb1f7f13da1027ea04c4f6019287a04381f200e17db6d2f95ecb9da7
MD5 42b1535f93653b1989317537bdfd282b
BLAKE2b-256 02b00b749425fcd8d86dda079f4c7e61af9c43e088db3517b01730390b30f318

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page