Agents can read `.env`, tokens, SSH keys, and database URLs.
AgentGuard is being built so secrets are blocked, redacted, or routed through safer local/private handling before they become prompt context or audit leakage.
Pre-product security infrastructure
Securie is building AgentGuard: a zero-trust control layer for coding agents before they touch secrets, terminals, Git, cloud, databases, CI/CD, or production systems.
Why this exists
Developer machines now host autonomous actors that can read repositories, run shells, call tools, browse, install packages, push branches, and interact with production-adjacent systems.
AgentGuard is being built so secrets are blocked, redacted, or routed through safer local/private handling before they become prompt context or audit leakage.
Runtime policy should deny dangerous patterns, require approval for sensitive changes, and terminate repeated denied behavior.
First-class agent identity turns invisible automation into attributable sessions with owners, permissions, policy decisions, and compliance evidence.
Planned vertical slice
The current CLI is pre-alpha and passthrough only. The first product proof is intentionally small: block `.env` reads, block destructive commands, allow normal work, redact detected secrets, and render a session report.
$ agentguard run -- bash -c "cat .env && rm -rf /tmp/build"
deny file_read .env policy=no_env_reads
deny command_exec rm -rf policy=destructive_command
redact stdout AKIA... marker=[REDACTED:aws-access-key]
report session ags_01... markdown + json audit evidence
allow file_read src/main.rs policy=normal_repo_read
Control plane
A wrapper alone does not answer who the agent is, what it can access, which data must be redacted, which actions require approval, or what happened during the session. Securie is designed to make those decisions explicit, enforceable, and auditable.
Honest hallucinating agent in V1.
Single security-critical runtime.
Wrap AI coding agents locally.
Secrets and production by default.
SEO resource hub
Each page maps to a high-intent search cluster for teams evaluating AI coding-agent security, runtime enforcement, agent identity, approvals, audit logs, and compliance evidence.
How AgentGuard is designed to watch files, commands, Git, network, secrets, and child processes.
Read page Agent identityWhy agent IDs, owners, session IDs, risk tiers, and revocation are becoming core security primitives.
Read page Policy engineAllow, deny, redact, approval-gate, alert, terminate, and log-only decisions for real agent behavior.
Read page Audit and complianceEvidence for security reviews, SOC 2 readiness, incident response, and enterprise questionnaires.
Read page Threat modelA practical threat model for honest hallucinating agents, prompt injection, and future isolation tiers.
Read page ChecklistA buyer-ready checklist for secret blocking, runtime controls, approvals, audit logs, and revocation.
Read page Claude Code securityHow teams should think about hooks, shell access, secrets, approvals, and audit logs around Claude Code.
Read page Codex securityRuntime controls for Codex-style coding agents that can inspect code, run commands, and modify repositories.
Read page Cursor AI securityGuardrails for IDE-native coding assistants that can touch source code, secrets, terminals, and Git.
Read pageQuestions buyers ask
Pre-product does not mean vague. The category, threat model, and first slice are intentionally explicit so design partners can pressure-test the right controls.
No. The product direction is identity, scoped permissions, deterministic runtime enforcement, data protection, approvals, audit logs, integrations, and revocation. Process isolation can become one enforcement primitive, but it is not the company category.
Not yet. The current repository is pre-alpha and passthrough only. Blocking `.env` reads is one of the first required vertical-slice tests.
Security-conscious engineering teams using Claude Code, Codex, Cursor-style agents, Cline, OpenHands, Devin-style agents, or internal coding agents.