Main
Adopt Rampart in three passes:
- Start in “monitor” mindset: wire it into your agent, run your normal workflows, and read the audit trail.
- Add deny rules for destructive patterns (delete, rm, drop) and require approval for risky tools.
- Use the MCP proxy for clients without hook support (Claude Desktop/Cursor): wrap servers so policies apply at tool-level.
README excerpt (verbatim)
Claude Code's --dangerously-skip-permissions mode, and similar autonomous modes in Cline and Codex, give agents unrestricted shell access. Your agent can read your SSH keys, exfiltrate your .env, or rm -rf / with no guardrails.
Rampart sits between the agent and your system. Every command, file access, and network request is evaluated against your policy before it executes. Dangerous commands never run.
Install
# Homebrew (macOS and Linux, recommended)
brew install peg/tap/rampart
# One-line install (no sudo required)
curl -fsSL https://rampart.sh/install | bash
# Go install (requires Go 1.24+)
go install github.com/peg/rampart/cmd/rampart@latestWindows (PowerShell):
irm https://rampart.sh/install.ps1 | iexAfter installing, run rampart quickstart or follow the setup steps below.