Practical Notes
A pragmatic rollout: install the binary, enable Claude Code integration, and restart. Then run 10–20 normal tasks and record what gets flagged. Create allow/deny rules based on real incidents: metadata SSRF attempts, secret patterns in prompts, and risky tool chains (e.g., web fetch → write file → exec).
Safety note: Don’t rely on a single control. Combine firewall/proxy checks with least-privilege tools, sandboxing, and human approval for high-risk actions.
FAQ
Q: Is this a replacement for sandboxing? A: No. It complements sandboxing by enforcing egress policy and scanning tool traffic.
Q: Will it break my workflows? A: Start in observe mode (or with a permissive preset) and tighten rules once you see false positives.
Q: Where should I enforce policy? A: At the boundary: before tools execute or requests leave the machine/network.