Inline runtime decisions
`allow`, `block`, `review`, and `log` happen before execution continues, not after damage is done.
Release 1.2.0 is live
AgentFirewall stops dangerous shell, file, network, and tool side effects before they happen. It now ships with two official adapters, one shared policy core, and evidence-backed release gates that show exactly what is supported today.
Why this matters
The moment an agent can run shell commands, read files, write credentials, or make outbound HTTP requests, safety becomes an execution problem. AgentFirewall is designed to sit in that path before side effects happen.
`allow`, `block`, `review`, and `log` happen before execution continues, not after damage is done.
The same policy, approval, audit, and runtime-context model now spans LangGraph and OpenAI Agents SDK.
Release gates, eval expectations, and the runtime support manifest keep the promise narrow and inspectable.
Progress
This project is not trying to sound universal too early. The work so far has been to build one reusable runtime firewall core, prove it on LangGraph, then prove that the same contract holds on a second adapter.
LangGraph shipped as the first official path with guarded shell, file, and HTTP surfaces.
Capability matrix, conformance validation, release gates, and runtime support export moved into code.
OpenAI Agents SDK is now official on a narrow `function_tool`-first boundary with local eval evidence.
Lower generic-wrapper adoption friction, add more workflow pressure, then widen into MCP-oriented paths.
Live support proof
These cards are rendered from the same runtime support manifest exported by the package. They reflect the current official adapter inventory, preview runtime inventory, capability matrix, and packaged local evidence.
Packaged local evidence
Each card below reflects compact eval and conformance data exported by the core engine.
Plan
After shipping the second official adapter, the next job is not to spray support claims everywhere. The next job is to make the current contract easier to adopt, harder to misunderstand, and stronger under real workloads.
Keep LangGraph and OpenAI Agents aligned on policy semantics, audit shape, and release-gate expectations.
Make the preview path easier to try in `log-only` without overstating it as a full adapter contract.
Add more realistic task traces, not just synthetic unit-level evidence, so trust can come from observed behavior.
Reuse the same event model where possible and avoid new surface claims until new evidence actually exists.
Vision
The long game is not a framework-specific guardrail product. The long game is one runtime firewall core that can protect multiple adapters without changing what `review`, `block`, audit correlation, or guarded execution mean.
Translate runtimes into shared event kinds such as `prompt`, `tool_call`, `command`, `file_access`, and `http_request`.
Adapters should translate runtime hooks, not fork policy semantics. That is what keeps multi-runtime support believable.
The product should widen from two official adapters to broader coverage only when conformance and workflow evidence stay honest.
Install
Use the official adapters when you can. Use the generic wrapper path when your runtime is not yet first-class.
pip install agentfirewall[langgraph]
python examples/langgraph_quickstart.py
Official adapter with guarded shell, file, and HTTP surfaces plus packaged eval evidence.
pip install agentfirewall[openai-agents]
python examples/openai_agents_quickstart.py
Official adapter on the documented `function_tool`-first support boundary.
pip install agentfirewall
python examples/generic_tool_dispatcher.py
Preview runtime path for unsupported runtimes. Best used in `log-only` or local evaluation first.
Docs and evidence
The site is only the front door. The support boundary, release notes, strategy, and evidence all live in the repository.
Quickstart, support scope, and the current release position.
The narrow import-level promise for 1.2.0.
The exact commands and outcomes used to validate this release.
The machine-readable inventory used by this page.
Roadmap, positioning, product status, and adapter plans.
Release metadata and published artifacts.
Ready to evaluate it?
AgentFirewall is most useful when you can see exactly what it will allow, review, block, and log in your own workflows.