The security layer for AI coding agents
Claude Code’s--dangerously-skip-permissions mode — and similar autonomous modes in Cline and Codex — give agents unrestricted shell access. Rampart sits between the agent and your system: every command, file access, and network request is evaluated against your YAML policy before it executes. Dangerous commands are blocked in microseconds. Everything is logged.
One command to get protected:
rampart quickstart auto-detects Claude Code or Cline, installs rampart serve as a boot service, configures hooks, and runs a health check. Done.
How it works
Pattern matching handles 95%+ of decisions in microseconds. The optional rampart-verify sidecar adds LLM-based classification for ambiguous commands. All decisions go to a hash-chained audit trail. Every command Claude executes goes through Rampart’s policy engine first:Key features
Native agent integration
Claude Code, Cline, OpenClaw, Codex — or wrap any agent with shell interception
Microsecond policy engine
Pattern matching evaluates 95%+ of decisions in single-digit microseconds
Hash-chained audit trail
Tamper-evident JSONL audit logs with SIEM integration (syslog/CEF)
Human-in-the-loop approvals
Native approval prompts for Claude Code, dashboard for other agents
Live monitoring dashboard
Real-time TUI and web dashboard with policy testing and approval management
Project-local policies
Commit
.rampart/policy.yaml to your repo for team-shared security rulesMicrosecond policy engine
Pattern matching evaluates 95%+ of decisions in single-digit microseconds
Hash-chained audit trail
Tamper-evident JSONL audit logs with SIEM integration (syslog/CEF)
Human-in-the-loop approvals
Native approval prompts for Claude Code, dashboard for other agents
Live monitoring dashboard
Real-time TUI and web dashboard with policy testing and approval management
Project-local policies
Commit
.rampart/policy.yaml to your repo for team-shared security rulesSupported agents
| Agent | Setup | Integration |
|---|---|---|
| Claude Code | rampart setup claude-code | Native PreToolUse hooks — works in --dangerously-skip-permissions mode |
| Cline | rampart setup cline | Native hooks via settings |
| OpenClaw | rampart setup openclaw | Shell shim with human-in-the-loop approval flow |
| Any agent | rampart wrap -- <agent> | Shell wrapping via $SHELL |
| MCP servers | rampart mcp -- <server> | MCP protocol proxy |
| System-wide | rampart preload -- <cmd> | LD_PRELOAD syscall interception |
OWASP coverage
Rampart maps to the OWASP Top 10 Risks for Agentic AI:- Excessive Agency — Policy engine enforces least-privilege per tool call
- Unauthorized Tool Use — Every tool call evaluated before execution
- Insecure Tool Implementation — Response scanning detects credential leaks
- Prompt Injection → Tool Abuse — Pattern matching catches injected commands
- Insufficient Audit Trail — Hash-chained JSONL with SIEM export
- Data Exfiltration — Domain blocking and credential pattern detection
- Uncontrolled Autonomy — Human-in-the-loop for sensitive operations
Next steps
Installation
Install Rampart on macOS, Linux, or Windows
Quick start
Get up and running in under 2 minutes
Writing policies
Learn how to write YAML policies for your agent
CLI reference
Complete command reference for all Rampart commands