Runtime control for agentic AI.
Agentwall sits between AI agents and real-world action surfaces: shell commands, tools, network egress, browser actions, communication channels, identity, and content delivery.
It answers one question before an agent acts:
Should this action be allowed, denied, redacted, or routed to a human?
Agent prompts are not a security boundary. Agentwall enforces policy at runtime, where the risk becomes real.
Core principles:
- Least privilege by default
- Default-deny egress
- Human approval for high-risk actions
- Communication-channel containment
- Static command preflight before shell execution
- Tamper-evident audit trails for operator review
- Policy evaluation API
- DLP scanning for secrets and PII
- Approval queue and operator controls
- Telegram/channel guardrails
- Damage Control bash/command preflight
- Local Security Command Center dashboard
- Watchdog and runtime health signals
- Structured audit events and decision evidence
Agentwall runs a local operator dashboard:
http://127.0.0.1:3015/dashboard
The dashboard is built around three surfaces:
- Local Runtime: service health, default-deny posture, approval mode, flood controls
- Communication Guardrails: scoped channel policies for agent bots in shared conversations
- Bash Firewall: preflight checks for risky shell commands before execution
Advanced mode exposes policy, audit, federation, sessions, and diagnostic views.
git clone https://github.com/reesepj/agentwall.git
cd agentwall
npm install
npm run build
node dist/cli.js init --mode guarded --allow-hosts api.openai.com
node dist/cli.js doctor
node dist/cli.js startRun tests:
npm testpolicy:
defaultDecision: "deny"
egress:
enabled: true
defaultDeny: true
allowPrivateRanges: false
allowedSchemes: ["https"]
allowedPorts: [443]POST /evaluate
POST /inspect/content
POST /integrations/communication-channel/guardrail
POST /integrations/damage-control/command-preflight
GET /api/dashboard/state
docs/README.mddocs/architecture.mddocs/product-thesis.mddocs/threat-model.mddocs/tutorials/
This repo is the local/open-source runtime control plane. Managed service operations, enterprise connectors, proprietary policy intelligence, and incident automation workflows belong outside the OSS core.
MIT