Rampart sits between your agent and your system. Every command evaluated against your YAML policy before it runs. One binary. No cloud. No latency your agent can feel.
Claude Code's --dangerously-skip-permissions. Codex's --full-auto mode. They trade safety for speed. Here's what that actually means.
No guardrails. No audit log. No way to know it happened.
Every operation in real time. Green means go. Red means stopped. You see everything before it happens.
See exactly what your agent does, then generate rules from the audit log.
Sandboxes block npm install, git clone, and every API call your agent needs to work. Rampart allows all of that and blocks credential reads, exfiltration, and destructive commands.
You set the rules, or use ours. Rampart allows what your agent needs and blocks what it doesn't. 40+ policies, every decision local, in microseconds.
action: require-approval on any rule and Rampart holds the command until you say yes or no.rampart audit to see what your agent actually did, then feed the log back to generate new policies.One command per agent. Or run rampart setup with no args and it finds everything installed.
No DSL, no SDK, no proprietary format. 40+ policies included. The YAML block below is the whole syntax.
version: "1"
policies:
- name: block-credential-leak
match:
tool: file.read
rules:
- when:
path_matches:
- "**/.env"
- "**/.ssh/*"
- "**/id_rsa"
action: deny
message: "Credential access blocked"
- name: require-approval-outbound
match:
tool: http
rules:
- when:
url_not_in_allowlist: true
action: require-approval
I built Rampart after my own agent nearly nuked a directory on my homelab
setup auto-detects Claude Code, Codex, Cline, and OpenClaw. Your agent is protected the next time you run it.
Rampart blocks dangerous operations before they execute. Snare catches what slips through. Different tools, same mission, designed to work together.
Rampart blocks. Snare catches.