agentseatbelt
v0.2.0
Published
Runtime firewall for AI coding agents before they touch your terminal, repo, secrets, or production.
Maintainers
Readme
AgentSeatbelt
Runtime firewall for AI coding agents before they touch your terminal, repo, secrets, or production.

AgentSeatbelt is the runtime security layer between AI agents and real-world execution.
Policy, approvals, and audit trails for AI agents before they touch your terminal, repo, secrets, cloud, or production.
Built for:
- Investors evaluating category-defining AI safety infrastructure
- Senior developers shipping with AI coding agents in real repositories
- Security and DevSecOps teams requiring deterministic local controls
Why now
AI coding agents can run shell commands, modify repositories, install dependencies, read local files, and trigger deployment paths. Developer environments were built for human intent, not autonomous execution. AgentSeatbelt adds a deterministic control layer between agent output and system impact.
What AgentSeatbelt protects
- Terminal execution before risky commands run
- Repository integrity and rollback recovery points
- Secret-bearing paths and common credential access patterns
- Production and infrastructure command surfaces
- Workspace-scoped session context via
agentSessionId
Core capabilities
- Deterministic risk classification (no paid APIs)
- Rule-based policy engine with profiles (
dev,strict,ci) - Secret-read blocking by default
- Approval gating for high-impact actions
- Git checkpoint metadata before risky execution
- Action receipts in
json,ndjson, and table views - Receipt hash-chaining (
chainIndex,previousReceiptHash,receiptHash) - Protected session mode:
seatbelt agent dev - Chain integrity verification:
seatbelt verify - Runtime posture summary:
seatbelt status
Category
Developer-first runtime security for agent execution.
This is not a generic prompt guardrail, not a sandbox, and not an endpoint detection agent. It is an execution-time policy and approval layer for risky agent actions.
Security model
- Local-first runtime execution
- No telemetry
- No cloud upload of commands, receipts, or config
- Deterministic policy outcomes
- Workspace-scoped session IDs for traceable runs
Demo in 90 seconds
seatbelt init
seatbelt run "echo safe path"
seatbelt run "cat .env"
seatbelt run "rm -rf build" --dry-run
seatbelt run "vercel --prod" --dry-run
seatbelt verify
seatbelt status
seatbelt logs --tail 10
seatbelt doctorCross-platform scripts:
demo.shdemo.ps1
Quickstart
npm install
npm run build
node dist/index.js --helpOptional local link:
npm link
seatbelt --helpHealth checks:
npm run test
npm run typecheck
npm run lintSession mode (v0)
seatbelt agent devCreates .seatbelt/session.json with:
agentSessionIdworkspacePathstartedAtprotectedSurfaces
If a valid session already exists for the current workspace, the same agentSessionId is reused.
From CLI wedge to control plane
- v0: local terminal and repository enforcement for developers.
- v1: direct coding-agent wrappers and integration guides.
- v2: CI and MCP/tool-call policy enforcement.
- v3: team policy bundles and audit sync patterns.
- v4: organization-wide agent runtime governance.
Configuration
Default config file: .seatbelt/config.yml
rules:
- pattern: "cat .env"
action: block
severity: critical
- pattern: "rm -rf"
action: require_approval
severity: critical
- pattern: "vercel --prod"
action: require_approval
severity: critical--seed-baseline is optional, local-only, disabled by default, and never uploads shell history.
Policy pack initialization:
seatbelt init --policy-pack production-safe --profile strictProfessional docs
- SECURITY.md
- CONTRIBUTING.md
- CODE_OF_CONDUCT.md
- SUPPORT.md
- GOVERNANCE.md
- docs/threat-model.md
- docs/BYPASS_AND_LIMITATIONS.md
- docs/AGENT_INTEGRATIONS.md
- docs/MCP_GATEWAY_ROADMAP.md
- docs/COMPETITIVE_LANDSCAPE.md
- policy-packs/README.md
- docs/SPEEDRUN_BRIEF.md
- docs/LAUNCH_PLAN.md
- docs/USER_INTERVIEW_SCRIPT.md
- docs/DESIGN_PARTNER_MEMO.md
- docs/LANDING_PAGE_COPY.md
- docs/PROOF_BOARD.md
- CHANGELOG.md
- RELEASE_NOTES_v0.2.0.md
- RELEASE_NOTES_v0.1.0.md
Roadmap
- Agent session hardening
- MCP proxy / tool-call enforcement
- CI / GitHub Actions mode
- Team policy packs
- IDE integrations
