Profiles
| Profile | Default Action | Use Case |
|---|---|---|
standard | allow | Block dangerous, watch suspicious, allow the rest |
ci | allow | Strict mode for headless/CI — all approvals become denies |
paranoid | deny | Explicit allowlist for everything |
yolo | allow | Log-only, no blocking |
standard (Recommended)
Balanced security for interactive development.- Blocks destructive commands (
rm -rf /,mkfs,dd of=/dev/sda) - Blocks credential access (
.ssh/id_*,.aws/credentials,.env) - Blocks reverse shells and piped execution (
curl | bash) - Blocks exfiltration domains (
*.ngrok.io,webhook.site) - Requires approval for
sudo - Watches environment variable access
- Allows everything else
ci (Headless Mode)
Strict preset for CI/CD and unattended agents. All interactive approvals become hard denies.- Same rules as
standard - Converts
action: asktoaction: deny(no human in the loop) - Ideal for GitHub Actions, GitLab CI, Jenkins, etc.
paranoid (Deny-by-Default)
Explicit allowlist. Nothing runs unless you permit it.default_action: deny- Only whitelisted commands, files, and domains are allowed
- Use this for high-risk environments or adversarial threat models
yolo (Audit-Only)
Log everything, block nothing. For monitoring without enforcement.default_action: allow- All actions use
action: log(alias:watch) - Full audit trail, zero blocking
- You want to observe agent behavior without interference
- You’re testing a new agent and want to see what it tries to do
- You need a compliance audit trail but can’t block operations
Switching Profiles
--force flag replaces standard.yaml, paranoid.yaml, ci.yaml, and yolo.yaml but never touches custom.yaml.
Customizing Profiles
Don’t edit the built-in profiles directly — they’re overwritten byrampart upgrade. Instead:
-
Add rules to custom.yaml
Your rules merge with the active profile.
-
Use project policies
Add
.rampart/policy.yamlto your repo for project-specific rules. See Project Policies. -
Copy and modify
Then pass
--config ~/.rampart/policies/my-profile.yamltorampart serve.
Policy Evaluation Order
When multiple policies are active:- Priority — policies are sorted by
priority(lower = first) - Deny always wins — if any policy denies, the action is denied
- Custom rules merge with built-in profiles
See Also
- Writing Policies — Full YAML schema reference
- Project Policies — Repo-specific rules
- Testing Policies — Validate with
rampart test