By aporthq
Enforce security policies on every AI agent tool call in Claude Code and OpenClaw using APort guardrails. Activate local passport checks to intercept, evaluate, and block unauthorized actions before execution. Verify compliance status and audit logs with zero network calls.
npx claudepluginhub aporthq/aport-agent-guardrails --plugin aport-guardrailsSet up APort guardrails for Claude Code. Creates a passport and activates the PreToolUse hook that enforces policy on every tool call. Local evaluation by default, zero network calls.
Set up APort guardrails for OpenClaw. Local-first policy enforcement that checks tool calls against your passport before execution. Zero network calls by default. Open-source (Apache 2.0).
Check APort guardrail status — passport validity, evaluation mode, and recent audit log entries. Works for all frameworks.
Matches all tools
Hooks run on every tool call, not just specific ones
Share bugs, ideas, or general feedback.
Security controls for AI agents — deterministic policy enforcement, OWASP ASI10 scanning, and audit trails.
A secure runtime for Claude Code. Intercepts every tool call with policy-based allow/block/ask decisions, evasion detection, path fencing, file snapshots, and audit logging.
Command Line Agent Safety Harness. All interactions with clash policy should go through this plugin
Runtime security enforcement for AI coding agents — policy hooks, audit receipts, threat hunting, and security tools for Claude Code.
Author custom Falco rules for Prempti to control what AI coding agents can do