Endpoint
enforce mode, deny decisions are blocked; approval-required decisions are queued.
Path Parameters
The name of the tool being invoked (e.g.,
exec, read, write, fetch)Request Headers
Bearer token for authentication
Must be
application/jsonRequest Body
Agent identifier (e.g.,
claude-code, aider, custom-agent)Session identifier, typically
repo/branch format (e.g., myapp/main)Tool-specific parameters. For
exec tools, includes command. For file tools, includes path.Additional properties are allowed and vary by tool type.Optional run identifier for grouping related tool calls
Optional tool input for MCP-style requests
Optional tool output for response-side policy evaluation. When provided, the server scans the output for sensitive content before returning.
Response Fields
Policy decision:
allow, deny, watch, ask, or require_approvalHuman-readable decision message
Policy evaluation time in microseconds
Name of the matched policy (if any)
Array of suggested commands to allow the operation (appears on
deny)Example: ["rampart allow exec 'npm install' --reason 'dev dependency'"]Approval request ID (only present when
decision is ask or require_approval)Approval status:
pending (only present on approval-required responses)ISO 8601 timestamp when approval expires (only present on approval-required responses)
Tool output (when
response was provided in request). May be [REDACTED: sensitive content removed by Rampart] if blocked.Status Codes
| Status | Meaning |
|---|---|
200 OK | Evaluated successfully — tool call allowed, watched, or denied in monitor mode |
202 Accepted | Approval required; request queued |
400 Bad Request | Invalid JSON body |
401 Unauthorized | Missing or invalid bearer token |
403 Forbidden | Denied in enforce mode |
503 Service Unavailable | Approval queue full |
Examples
Allowed Request
Denied Request
Approval Required
File Read
With Run ID (Grouped Operations)
Including a
run_id allows grouping related tool calls. When you bulk-approve a run, all pending approvals with the same run_id are resolved together.Response-Side Evaluation
Response-side evaluation scans tool output for credentials and sensitive patterns. If detected, the response is redacted and the decision is changed to
deny.Common Use Cases
Integration with Custom Agents
Auto-Approved Runs
When arun_id has been bulk-approved, subsequent tool calls with the same run_id are automatically allowed:
Next Steps
Preflight
Dry-run policy checks before execution
Approvals
Manage approval workflows