Open-sourcing a shell-level security layer for AI agents
After working with AI agents for a while, I kept running into the same issue:
eventually the agent ignores boundaries, reads .env files, touches production resources, or uses secrets it was never supposed to access.
Even with MCP read-only setups and carefully written prompts, the shell itself is still trusted too much.
So I started building a shell-level control layer for AI agents:
- block or sanitize dangerous commands
- expose virtual/fake secrets instead of real ones
- separate DEV / PROD access policies
- restrict network/domain access
- enforce runtime policies instead of relying only on prompts
The goal is to make agents safer and more deterministic inside real developer environments.
I’m now open-sourcing it and looking for people who use Claude Code, Codex, Cursor, etc. to try breaking it on real workflows.
Feedback, criticism, and attack ideas are very welcome.
link to PyPI in the comments