Cette page est affichée en anglais. Une traduction française est en cours.
CLI ToolsMay 12, 2026·2 min de lecture

Tirith — Terminal Security for AI Agents

Tirith flags risky terminal commands for developers and AI agents—pipe-to-shell, ANSI injection, homograph URLs, and data exfiltration—before execution.

Prêt pour agents

Cet actif peut être lu et installé directement par les agents

TokRepo expose une commande CLI universelle, un contrat d'installation, le metadata JSON, un plan spécifique à la cible et le contenu raw pour aider les agents à juger l'adaptation, le risque et les prochaines actions.

Needs Confirmation · 62/100Policy : confirmer
Cible
Claude Code
Type
Cli
Installation
Single
Confiance
Confiance : Established
Point d'entrée
README.md
Commande CLI universelle
npx tokrepo install b64aa0f0-2f92-4b9a-9b52-8cc0c6a5c8b3
Introduction

Tirith flags risky terminal commands for developers and AI agents—pipe-to-shell, ANSI injection, homograph URLs, and data exfiltration—before execution.

  • Best for: teams running agent-driven shell commands who need guardrails against copy-paste supply-chain tricks
  • Works with: macOS/Linux/Windows installs, YAML policy files, shell hooks, optional MCP server mode and setup guides for popular AI CLIs
  • Setup time: 10–20 minutes

Practical Notes

  • README documents policy init/validate/test commands and a strictness model (paranoia 1–4).
  • Install options include Homebrew, npm, Cargo, and OS packages; policy discovery looks for .tirith/policy.yaml.

Where It Fits in an Agent Workflow

If you let an agent propose commands, Tirith can sit in front of execution:

  • Use policy tests during planning to catch “curl | bash” and similar source-to-sink flows early.
  • Keep a small allowlist (domains you trust) and blocklist (known bad) as code in your repo.
  • In CI, apply a stricter scan profile (README shows scan profiles under policy) for configs like .claude/*, mcp.json, and other agent-control files.

Practical “Do This, Not That”

  • Prefer pinned installs over curl | bash whenever possible.
  • If you must run a script installer, validate the URL (homograph/invisible unicode is a real class of attacks) and record the checksum or release tag you used.

FAQ

Q: Does Tirith execute commands for me? A: It can validate and policy-test commands; the goal is to surface risk before you run them.

Q: Where does the policy live? A: The README states it discovers .tirith/policy.yaml in your repo (walking up), or a user config path.

Q: Can I tune strictness? A: Yes—policy parameters include a paranoia level and action overrides for escalation.

🙏

Source et remerciements

Source: https://github.com/sheeki03/tirith > License: AGPL-3.0 > GitHub stars: 2,307 · forks: 80

Fil de discussion

Connectez-vous pour rejoindre la discussion.
Aucun commentaire pour l'instant. Soyez le premier à partager votre avis.

Actifs similaires