loading…
Search for a command to run...
loading…
Blocks dangerous operations — rm -rf, sensitive file access, privilege escalation, and more are denied before execution. Gates risky commands behind human appro
Blocks dangerous operations — rm -rf, sensitive file access, privilege escalation, and more are denied before execution. Gates risky commands behind human approval Simulates blast radius — wildcard operations like rm \*.tmp are evaluated before running Automatic backup of files Full audit of commands
Your agent can say anything. It can only do what policy allows.
AI agents with filesystem and shell access can delete files, leak credentials, or execute destructive commands, often without the user realizing until it is too late.
Runtime Guard sits between your AI agent and your system, enforcing policy on every file and shell action before it executes. Install once, configure your rules, and your agent operates within the boundaries you set. Works with Claude Code, Claude Desktop, Cursor, Codex, and any MCP-compatible client. No retraining, no prompt engineering, no external account required.
agent -> execute_command("rm -rf /tmp/build")
✗ BLOCKED destructive command pattern: rm -rf
matched_rule: destructive_command | decision: blocked
agent -> execute_command("git push --force")
⏸ APPROVAL REQUIRED awaiting operator
token: a4f2b9 | expires: 10min | check GUI to approve
agent -> write_file("README.md", ...)
✓ ALLOWED backup created before write
backup_location: ~/.local/state/airg/backups/2026-03-18
pipx install ai-runtime-guard
pipx ensurepath # if airg* commands are not found
# open a new terminal
airg-setup
airg-doctor
After setup, open http://127.0.0.1:5001 and add your first agent from Settings -> Agents.
Alternative quick start (venv):
python3 -m venv .venv-airg && source .venv-airg/bin/activatepython -m pip install --upgrade pippython -m pip install ai-runtime-guardairg-setup (guided, recommended: select/create workspace during setup; includes telemetry opt-in prompt, default Yes)airg-doctorSettings -> Agents, add agents manually, and apply MCP config/hardening from there.Source-clone path:
git clone --branch main https://github.com/runtimeguard/runtime-guard.gitcd runtime-guardpython3 -m venv .venv-airg && source .venv-airg/bin/activatepython -m pip install --upgrade pippython -m pip install .airg-setupairg-doctorUnattended automation-only setup (CI/non-interactive):
airg-setup --defaults --yes --workspace /absolute/path/to/workspaceSee docs/INSTALL.md for the full install reference.
Prevention
rm -rf, privilege escalation, sensitive file access) before they runControl
AIRG_WORKSPACEAIRG_AGENT_IDVisibility
activity.logreports.db for a dashboard view of agent behaviorHardening
Runtime Guard is built as an MCP server because MCP provides the interception point you need. When your agent issues a tool call, Runtime Guard evaluates it against policy before execution. For clients that support pre-tool hooks (like Claude Code), AIRG can also deny the agent's native file and shell tools, forcing risky operations through the policy layer.
This approach is the closest to kernel-level enforcement without requiring system privileges or modifying your agent, and it works across any MCP-compatible client without per-agent engineering.
Developers and operators running AI agents who want deterministic guardrails on what an agent can actually do to their system, without giving up agent autonomy or rewriting their workflow.
| Platform | Clients |
|---|---|
| macOS | Claude Code, Claude Desktop, Cursor, Codex |
| Linux | Claude Code, Claude Desktop, Cursor, Codex |
Enforcement depth varies by client. MCP policy enforcement is universal; hook-based native tool restriction and sandboxing depend on what each client exposes.
What AIRG is designed for: reducing accidental damage from agent mistakes, hallucinated commands, and policy-evasion patterns.
What AIRG is not: a full malicious-actor containment platform.
Known enforcement boundary:
Settings -> Agents in the GUI to apply hook-based native tool restrictions where supportedAIRG_WORKSPACEThe default project root for guarded agent operations. execute_command runs from this directory, file tools evaluate path policy relative to this root, and traversal outside the root is blocked. Multiple workspaces are supported. Each agent profile should set workspace explicitly in its MCP config.
AIRG_AGENT_IDThe runtime identity key used for activity and report attribution, per-agent policy override resolution, and posture state in Settings -> Agents.
AIRG includes a local web control plane at http://127.0.0.1:5001 for policy editing, approvals, agent profile management, reports, and telemetry control.
Service commands:
airg-service install --workspace /absolute/path/to/airg-workspace
airg-service start | status | stop | restart | uninstall
AIRG supports optional anonymous telemetry to help prioritize improvements. It is opt-in during setup (default: Yes) and can be toggled any time from Policy -> Advanced -> Anonymous telemetry.
Добавь это в claude_desktop_config.json и перезапусти Claude Desktop.
{
"mcpServers": {
"ai-runtime-guard": {
"command": "npx",
"args": []
}
}
}Web content fetching and conversion for efficient LLM usage.
Retrieval from AWS Knowledge Base using Bedrock Agent Runtime.
Provides auto-configuration for setting up an MCP server in Spring Boot applications.
A very streamlined mcp client that supports calling and monitoring stdio/sse/streamableHttp, and can also view request responses through the /logs page. It also