🐊 Policy Controller for Kubernetes
-
Updated
Mar 12, 2026 - Go
🐊 Policy Controller for Kubernetes
Runtime policy enforcement for AI agents. Cryptographic audit trail, human-in-the-loop approvals, kill switch. Zero code changes.
AI Agent Governance Toolkit — Policy enforcement, zero-trust identity, execution sandboxing, and reliability engineering for autonomous AI agents. Covers 10/10 OWASP Agentic Top 10.
API that leverages Clair to scan Docker Registries and Kubernetes Clusters for vulnerabilities
Governance gateway for AI agents — bounded, auditable, session-aware control with MCP proxy, shell proxy & HTTP API. Works with Cursor, Claude Code, Codex, and any MCP-compatible agent.
INTERCEPT / Policy as Code Auditing
[DEPRECATED] Moved to microsoft/agent-governance-toolkit
Open-source firewall for AI agents. Policy engine that controls what OpenClaw, Claude Code, Cursor, Codex, and any AI tool can do on your machine.
The antivirus for OpenClaw — approve dangerous actions, scan skills, block secret leaks, and keep humans in control, for safety.
RBAC/ABAC/ReBAC policy engine for Python with policy sets, condition DSL, and hot reload
The STAPL policy language for tree-structured, attribute-based access control policies
Implementation of OASIS XACML 2.0 & 3.0 specification in Java programming language
The enforcement layer for AI agents. Intercept enforces hard, deterministic limits on what agents can do at the MCP transport layer — before execution.
How to build your own policy engine
An in-cluster templating controller. Manage, mutate, and validate resources using webhooks and reconciliation. Backed by Jsonnet.
AI got hands. This is the leash. Policy, audit, kill switch for any AI agent with access to your accounts.
Armour provides a custom policy language and a distributed enforcement infrastructure to secure applications developed using micro-services
This is an open source project for building Rule/Policy Inference Engine written in Java
An open-source authorization layer where owners set policies, agents ask before acting, and counterparties can verify the agent was authorized.
Add a description, image, and links to the policy-engine topic page so that developers can more easily learn about it.
To associate your repository with the policy-engine topic, visit your repo's landing page and select "manage topics."