You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I have searched Warp feature requests and there are no duplicates
- [x] I have searched Warp docs and my feature is not there
[ ]
### Describe the solution you'd like?
Huge milestone on the open-source launch, Warp team. Shifting the terminal from a passive shell to an environment where agents like Claude Code have autonomous write access to production is a fundamental change in the dev workflow.
[ ]
As more of us move from "chatting with code" to "autonomous PR submission," a critical question emerges: What governs what the agent is actually permitted to execute?
[ ]
### The Governance Gap
Warp is a high-performance execution environment, but agent frameworks are not designed to be security perimeters. In production, engineering teams require controls that are independent of the LLM's reasoning: pre-execution policy enforcement, budget caps, and immutable audit trails. Warp gives your agents a company; SupraWall gives them a constitution.
[ ]
### Deterministic Tool Gating (MCP)
We built SupraWall as an open-source, framework-agnostic security perimeter. It wraps Claude Code via an MCP adapter and works inside Warp today with no changes needed to the terminal codebase. It intercepts tool calls before the terminal process is spawned.
# Execution is now gated by the SupraWall perimeter
await agent.run("Refactor the production database schema.")
```
[ ]
### What it produces:
* Pre-execution interception: Every tool call is gated before execution, regardless of the agent's intent.
* RSA-signed audit logs: Every decision (ALLOW/DENY/APPROVAL) is signed and written to an append-only log.
* Compliance ready: Generates the technical evidence required for CISO review and EU AI Act (Art 9/14) conformity assessments.
[ ]
### Open Question
How are other teams handling agent governance inside Warp? Are you rolling your own policy layers, using manual human-in-the-loop triggers for every single command, or exploring other perimeter tools?
### Is your feature request related to a problem? Please describe.
Currently, autonomous agents in the terminal lack a security perimeter that can enforce deterministic policies and provide an audit trail independent of the LLM's own reasoning. This gap makes it difficult for engineering teams to maintain governance over agent-led production changes.
I have searched Warp feature requests and there are no duplicates
- [x] I have searched Warp docs and my feature is not there
[ ]
### Describe the solution you'd like?
Huge milestone on the open-source launch, Warp team. Shifting the terminal from a passive shell to an environment where agents like Claude Code have autonomous write access to production is a fundamental change in the dev workflow.
[ ]
As more of us move from "chatting with code" to "autonomous PR submission," a critical question emerges: What governs what the agent is actually permitted to execute?
[ ]
### The Governance Gap
Warp is a high-performance execution environment, but agent frameworks are not designed to be security perimeters. In production, engineering teams require controls that are independent of the LLM's reasoning: pre-execution policy enforcement, budget caps, and immutable audit trails. Warp gives your agents a company; SupraWall gives them a constitution.
[ ]
### Deterministic Tool Gating (MCP)
We built SupraWall as an open-source, framework-agnostic security perimeter. It wraps Claude Code via an MCP adapter and works inside Warp today with no changes needed to the terminal codebase. It intercepts tool calls before the terminal process is spawned.
# Execution is now gated by the SupraWall perimeter
await agent.run("Refactor the production database schema.")
```
[ ]
### What it produces:
* Pre-execution interception: Every tool call is gated before execution, regardless of the agent's intent.
* RSA-signed audit logs: Every decision (ALLOW/DENY/APPROVAL) is signed and written to an append-only log.
* Compliance ready: Generates the technical evidence required for CISO review and EU AI Act (Art 9/14) conformity assessments.
[ ]
### Open Question
How are other teams handling agent governance inside Warp? Are you rolling your own policy layers, using manual human-in-the-loop triggers for every single command, or exploring other perimeter tools?
* [x] I have searched Warp feature requests and there are no duplicates
* [x] I have searched Warp docs and my feature is not there
[ ]
### Describe the solution you'd like?
Huge milestone on the open-source launch, Warp team. Shifting the terminal from a passive shell to an environment where agents like Claude Code have autonomous write access to production is a fundamental change in the dev workflow.
[ ]
As more of us move from "chatting with code" to "autonomous PR submission," a critical question emerges: What governs what the agent is actually permitted to execute?
[ ]
### The Governance Gap
Warp is a high-performance execution environment, but agent frameworks are not designed to be security perimeters. In production, engineering teams require controls that are independent of the LLM's reasoning: pre-execution policy enforcement, budget caps, and immutable audit trails. Warp gives your agents a company; SupraWall gives them a constitution.
[ ]
### Deterministic Tool Gating (MCP)
We built SupraWall as an open-source, framework-agnostic security perimeter. It wraps Claude Code via an MCP adapter and works inside Warp today with no changes needed to the terminal codebase. It intercepts tool calls before the terminal process is spawned.
# Execution is now gated by the SupraWall perimeter
await agent.run("Refactor the production database schema.")
```
[ ]
### What it produces:
- Pre-execution interception: Every tool call is gated before execution, regardless of the agent's intent.
- RSA-signed audit logs: Every decision (ALLOW/DENY/APPROVAL) is signed and written to an append-only log.
- Compliance ready: Generates the technical evidence required for CISO review and EU AI Act (Art 9/14) conformity assessments.
[ ]
### Open Question
How are other teams handling agent governance inside Warp? Are you rolling your own policy layers, using manual human-in-the-loop triggers for every single command, or exploring other perimeter tools?
### Is your feature request related to a problem? Please describe.
Currently, autonomous agents in the terminal lack a security perimeter that can enforce deterministic policies and provide an audit trail independent of the LLM's own reasoning. This gap makes it difficult for engineering teams to maintain governance over agent-led production changes.
None- [ ] ### Is your feature request related to a problem? Please describe.
Currently, autonomous agents in the terminal lack a security perimeter that can enforce deterministic policies and provide an audit trail independent of the LLM's own reasoning. This gap makes it difficult for engineering teams to maintain governance over agent-led production changes.
Huge milestone on the open-source launch, Warp team. Shifting the terminal from a passive shell to an environment where agents like Claude Code have autonomous write access to production is a fundamental change in the dev workflow.
As more of us move from "chatting with code" to "autonomous PR submission," a critical question emerges: What governs what the agent is actually permitted to execute?'s reasoning: pre-execution policy enforcement, budget caps, and immutable audit trails. Warp gives your agents a company; SupraWall gives them a constitution.
I have searched Warp feature requests and there are no duplicates
- [x] I have searched Warp docs and my feature is not there
[ ]
### Describe the solution you'd like?
[ ]
Huge milestone on the open-source launch, Warp team. Shifting the terminal from a passive shell to an environment where agents like Claude Code have autonomous write access to production is a fundamental change in the dev workflow.
[ ]
As more of us move from "chatting with code" to "autonomous PR submission," a critical question emerges: What governs what the agent is actually permitted to execute?
[ ]
### The Governance Gap
Warp is a high-performance execution environment, but agent frameworks are not designed to be security perimeters. In production, engineering teams require controls that are independent of the LLM's reasoning: pre-execution policy enforcement, budget caps, and immutable audit trails. Warp gives your agents a company; SupraWall gives them a constitution.
- [x] I have searched Warp feature requests and there are no duplicates
- [x] I have searched Warp docs and my feature is not there
[ ]
### Describe the solution you'd like?
Huge milestone on the open-source launch, Warp team. Shifting the terminal from a passive shell to an environment where agents like Claude Code have autonomous write access to production is a fundamental change in the dev workflow.
[ ]
As more of us move from "chatting with code" to "autonomous PR submission," a critical question emerges: What governs what the agent is actually permitted to execute?
[ ]
### The Governance Gap
Warp is a high-performance execution environment, but agent frameworks are not designed to be security perimeters. In production, engineering teams require controls that are independent of the LLM's reasoning: pre-execution policy enforcement, budget caps, and immutable audit trails. Warp gives your agents a company; SupraWall gives them a constitution.
[ ]
### Deterministic Tool Gating (MCP)
We built SupraWall as an open-source, framework-agnostic security perimeter. It wraps Claude Code via an MCP adapter and works inside Warp today with no changes needed to the terminal codebase. It intercepts tool calls before the terminal process is spawned.
# Execution is now gated by the SupraWall perimeter
await agent.run("Refactor the production database schema.")
```
[ ]
### What it produces:
* Pre-execution interception: Every tool call is gated before execution, regardless of the agent's intent.
* RSA-signed audit logs: Every decision (ALLOW/DENY/APPROVAL) is signed and written to an append-only log.
* Compliance ready: Generates the technical evidence required for CISO review and EU AI Act (Art 9/14) conformity assessments.
[ ]
### Open Question
How are other teams handling agent governance inside Warp? Are you rolling your own policy layers, using manual human-in-the-loop triggers for every single command, or exploring other perimeter tools?
### Is your feature request related to a problem? Please describe.
Currently, autonomous agents in the terminal lack a security perimeter that can enforce deterministic policies and provide an audit trail independent of the LLM's own reasoning. This gap makes it difficult for engineering teams to maintain governance over agent-led production changes.
- [ ] We built SupraWall as an open-source, framework-agnostic security perimeter. It wraps Claude Code via an MCP adapter and works inside Warp today with no changes needed to the terminal codebase. It intercepts tool calls before the terminal process is spawned.
# Execution is now gated by the SupraWall perimeter
await agent.run("Refactor the production database schema.")
```
[ ]
### What it produces:
* Pre-execution interception: Every tool call is gated before execution, regardless of the agent's intent.
* RSA-signed audit logs: Every decision (ALLOW/DENY/APPROVAL) is signed and written to an append-only log.
* Compliance ready: Generates the technical evidence required for CISO review and EU AI Act (Art 9/14) conformity assessments.
[ ]
### Open Question
How are other teams handling agent governance inside Warp? Are you rolling your own policy layers, using manual human-in-the-loop triggers for every single command, or exploring other perimeter tools?
### Is your feature request related to a problem? Please describe.
[ ]
Currently, autonomous agents in the terminal lack a security perimeter that can enforce deterministic policies and provide an audit trail independent of the LLM's own reasoning. This gap makes it difficult for engineering teams to maintain governance over agent-led production changes.We built SupraWall as an open-source, framework-agnostic security perimeter. It wraps Claude Code via an MCP adapter and works inside Warp today with no changes needed to the terminal codebase. It intercepts tool calls before the terminal process is spawned.
# pip install suprawallfromsuprawallimportsecure_agent, Policy# Define deterministic constraintspolicy=Policy(
max_daily_usd=10.00,
deny_regex=[".*(DROP|DELETE).*"], # Blocks destructive database commandsrequire_approval=["alembic upgrade", "python manage.py migrate"] # Pauses for review
)
# Wrap the Warp agent via MCPagent=secure_agent(warp_claude_code_agent, policy=policy)
# Execution is now gated by the SupraWall perimeterawaitagent.run("Refactor the production database schema.")
What it produces:
Pre-execution interception: Every tool call is gated before execution, regardless of the agent's intent.
RSA-signed audit logs: Every decision (ALLOW/DENY/APPROVAL) is signed and written to an append-only log.
Compliance ready: Generates the technical evidence required for CISO review and EU AI Act (Art 9/14) conformity assessments.
Open Question
How are other teams handling agent governance inside Warp? Are you rolling your own policy layers, using manual human-in-the-loop triggers for every single command, or exploring other perimeter tools?
Warp is a high-performance execution environment, but agent frameworks are not designed to be security perimeters. In production, engineering teams require controls that are independent of the LLM
Is your feature request related to a problem? Please describe.
Currently, autonomous agents in the terminal lack a security perimeter that can enforce deterministic policies and provide an audit trail independent of the LLM's own reasoning. This gap makes it difficult for engineering teams to maintain governance over agent-led production changes.
Pre-submit Checks
I have searched Warp feature requests and there are no duplicates
- [x] I have searched Warp docs and my feature is not there
[ ]
### Describe the solution you'd like?
Huge milestone on the open-source launch, Warp team. Shifting the terminal from a passive shell to an environment where agents like Claude Code have autonomous write access to production is a fundamental change in the dev workflow.
[ ]
As more of us move from "chatting with code" to "autonomous PR submission," a critical question emerges: What governs what the agent is actually permitted to execute?
[ ]
### The Governance Gap
Warp is a high-performance execution environment, but agent frameworks are not designed to be security perimeters. In production, engineering teams require controls that are independent of the LLM's reasoning: pre-execution policy enforcement, budget caps, and immutable audit trails. Warp gives your agents a company; SupraWall gives them a constitution.
[ ]
### Deterministic Tool Gating (MCP)
We built SupraWall as an open-source, framework-agnostic security perimeter. It wraps Claude Code via an MCP adapter and works inside Warp today with no changes needed to the terminal codebase. It intercepts tool calls before the terminal process is spawned.
# Execution is now gated by the SupraWall perimeter
await agent.run("Refactor the production database schema.")
```
[ ]
### What it produces:
* Pre-execution interception: Every tool call is gated before execution, regardless of the agent's intent.
* RSA-signed audit logs: Every decision (ALLOW/DENY/APPROVAL) is signed and written to an append-only log.
* Compliance ready: Generates the technical evidence required for CISO review and EU AI Act (Art 9/14) conformity assessments.
[ ]
### Open Question
How are other teams handling agent governance inside Warp? Are you rolling your own policy layers, using manual human-in-the-loop triggers for every single command, or exploring other perimeter tools?
### Is your feature request related to a problem? Please describe.
Currently, autonomous agents in the terminal lack a security perimeter that can enforce deterministic policies and provide an audit trail independent of the LLM's own reasoning. This gap makes it difficult for engineering teams to maintain governance over agent-led production changes.
Pre-submit Checks
I have searched Warp feature requests and there are no duplicates
- [x] I have searched Warp docs and my feature is not there
[ ]
### Describe the solution you'd like?
Huge milestone on the open-source launch, Warp team. Shifting the terminal from a passive shell to an environment where agents like Claude Code have autonomous write access to production is a fundamental change in the dev workflow.
[ ]
As more of us move from "chatting with code" to "autonomous PR submission," a critical question emerges: What governs what the agent is actually permitted to execute?
[ ]
### The Governance Gap
Warp is a high-performance execution environment, but agent frameworks are not designed to be security perimeters. In production, engineering teams require controls that are independent of the LLM's reasoning: pre-execution policy enforcement, budget caps, and immutable audit trails. Warp gives your agents a company; SupraWall gives them a constitution.
[ ]
### Deterministic Tool Gating (MCP)
We built SupraWall as an open-source, framework-agnostic security perimeter. It wraps Claude Code via an MCP adapter and works inside Warp today with no changes needed to the terminal codebase. It intercepts tool calls before the terminal process is spawned.
[ ]
```python
# pip install suprawall
from suprawall import secure_agent, Policy
[ ]
# Define deterministic constraints
policy = Policy(
max_daily_usd=10.00,
deny_regex=[".(DROP|DELETE)."], # Blocks destructive database commands
require_approval=["alembic upgrade", "python manage.py migrate"] # Pauses for review
)
[ ]
# Wrap the Warp agent via MCP
agent = secure_agent(warp_claude_code_agent, policy=policy)
[ ]
# Execution is now gated by the SupraWall perimeter
await agent.run("Refactor the production database schema.")
```
[ ]
### What it produces:
* Pre-execution interception: Every tool call is gated before execution, regardless of the agent's intent.
* RSA-signed audit logs: Every decision (ALLOW/DENY/APPROVAL) is signed and written to an append-only log.
* Compliance ready: Generates the technical evidence required for CISO review and EU AI Act (Art 9/14) conformity assessments.
[ ]
### Open Question
How are other teams handling agent governance inside Warp? Are you rolling your own policy layers, using manual human-in-the-loop triggers for every single command, or exploring other perimeter tools?
[ ]
Links:
* GitHub: github.com/wiserautomation/SupraWall
* Docs: supra-wall.com
[ ]
### Is your feature request related to a problem? Please describe.
Currently, autonomous agents in the terminal lack a security perimeter that can enforce deterministic policies and provide an audit trail independent of the LLM's own reasoning. This gap makes it difficult for engineering teams to maintain governance over agent-led production changes.
[ ]
### Operating system (OS)
macOS
[ ]
### How important is this feature to you?
3
[ ]
### Warp Internal (ignore) - linear-label:39cc6478-1249-4ee7-950b-c428edfeecd1
None### Pre-submit Checks
I have searched Warp feature requests and there are no duplicates
- [x] I have searched Warp docs and my feature is not there
[ ]
### Describe the solution you'd like?
Huge milestone on the open-source launch, Warp team. Shifting the terminal from a passive shell to an environment where agents like Claude Code have autonomous write access to production is a fundamental change in the dev workflow.
[ ]
As more of us move from "chatting with code" to "autonomous PR submission," a critical question emerges: What governs what the agent is actually permitted to execute?
[ ]
### The Governance Gap
Warp is a high-performance execution environment, but agent frameworks are not designed to be security perimeters. In production, engineering teams require controls that are independent of the LLM's reasoning: pre-execution policy enforcement, budget caps, and immutable audit trails. Warp gives your agents a company; SupraWall gives them a constitution.
[ ]
### Deterministic Tool Gating (MCP)
We built SupraWall as an open-source, framework-agnostic security perimeter. It wraps Claude Code via an MCP adapter and works inside Warp today with no changes needed to the terminal codebase. It intercepts tool calls before the terminal process is spawned.
[ ]
```python
# pip install suprawall
from suprawall import secure_agent, Policy
[ ]
# Define deterministic constraints
policy = Policy(
max_daily_usd=10.00,
deny_regex=[".(DROP|DELETE)."], # Blocks destructive database commands
require_approval=["alembic upgrade", "python manage.py migrate"] # Pauses for review
)
[ ]
# Wrap the Warp agent via MCP
agent = secure_agent(warp_claude_code_agent, policy=policy)
[ ]
# Execution is now gated by the SupraWall perimeter
await agent.run("Refactor the production database schema.")
```
[ ]
### What it produces:
* Pre-execution interception: Every tool call is gated before execution, regardless of the agent's intent.
* RSA-signed audit logs: Every decision (ALLOW/DENY/APPROVAL) is signed and written to an append-only log.
* Compliance ready: Generates the technical evidence required for CISO review and EU AI Act (Art 9/14) conformity assessments.
[ ]
### Open Question
How are other teams handling agent governance inside Warp? Are you rolling your own policy layers, using manual human-in-the-loop triggers for every single command, or exploring other perimeter tools?
[ ]
Links:
* GitHub: github.com/wiserautomation/SupraWall
* Docs: supra-wall.com
### Pre-submit Checks
* [x] I have searched Warp feature requests and there are no duplicates
* [x] I have searched Warp docs and my feature is not there
[ ]
### Describe the solution you'd like?
Huge milestone on the open-source launch, Warp team. Shifting the terminal from a passive shell to an environment where agents like Claude Code have autonomous write access to production is a fundamental change in the dev workflow.
[ ]
As more of us move from "chatting with code" to "autonomous PR submission," a critical question emerges: What governs what the agent is actually permitted to execute?
[ ]
### The Governance Gap
Warp is a high-performance execution environment, but agent frameworks are not designed to be security perimeters. In production, engineering teams require controls that are independent of the LLM's reasoning: pre-execution policy enforcement, budget caps, and immutable audit trails. Warp gives your agents a company; SupraWall gives them a constitution.
[ ]
### Deterministic Tool Gating (MCP)
We built SupraWall as an open-source, framework-agnostic security perimeter. It wraps Claude Code via an MCP adapter and works inside Warp today with no changes needed to the terminal codebase. It intercepts tool calls before the terminal process is spawned.
[ ]
```python
# pip install suprawall
from suprawall import secure_agent, Policy
[ ]
# Define deterministic constraints
policy = Policy(
max_daily_usd=10.00,
deny_regex=[".(DROP|DELETE)."], # Blocks destructive database commands
require_approval=["alembic upgrade", "python manage.py migrate"] # Pauses for review
)
[ ]
# Wrap the Warp agent via MCP
agent = secure_agent(warp_claude_code_agent, policy=policy)
[ ]
# Execution is now gated by the SupraWall perimeter
await agent.run("Refactor the production database schema.")
```
[ ]
### What it produces:
- Pre-execution interception: Every tool call is gated before execution, regardless of the agent's intent.
- RSA-signed audit logs: Every decision (ALLOW/DENY/APPROVAL) is signed and written to an append-only log.
- Compliance ready: Generates the technical evidence required for CISO review and EU AI Act (Art 9/14) conformity assessments.
[ ]
### Open Question
How are other teams handling agent governance inside Warp? Are you rolling your own policy layers, using manual human-in-the-loop triggers for every single command, or exploring other perimeter tools?
[ ]
Links:
- GitHub: github.com/wiserautomation/SupraWall
- Docs: supra-wall.com
[ ]
### Is your feature request related to a problem? Please describe.
Currently, autonomous agents in the terminal lack a security perimeter that can enforce deterministic policies and provide an audit trail independent of the LLM's own reasoning. This gap makes it difficult for engineering teams to maintain governance over agent-led production changes.
[ ]
### Operating system (OS)
macOS
[ ]
### How important is this feature to you?
3
[ ]
### Warp Internal (ignore) - linear-label:39cc6478-1249-4ee7-950b-c428edfeecd1
None- [ ] ### Is your feature request related to a problem? Please describe.
Currently, autonomous agents in the terminal lack a security perimeter that can enforce deterministic policies and provide an audit trail independent of the LLM's own reasoning. This gap makes it difficult for engineering teams to maintain governance over agent-led production changes.
[ ]
### Operating system (OS)
macOS
[ ]
### How important is this feature to you?
3
[ ]
### Warp Internal (ignore) - linear-label:39cc6478-1249-4ee7-950b-c428edfeecd1
None### Pre-submit Checks
I have searched Warp feature requests and there are no duplicates
I have searched Warp docs and my feature is not there
Describe the solution you'd like?
Huge milestone on the open-source launch, Warp team. Shifting the terminal from a passive shell to an environment where agents like Claude Code have autonomous write access to production is a fundamental change in the dev workflow.
As more of us move from "chatting with code" to "autonomous PR submission," a critical question emerges: What governs what the agent is actually permitted to execute?'s reasoning: pre-execution policy enforcement, budget caps, and immutable audit trails. Warp gives your agents a company; SupraWall gives them a constitution.
Deterministic Tool Gating (MCP)### Pre-submit Checks
What it produces:
Open Question
How are other teams handling agent governance inside Warp? Are you rolling your own policy layers, using manual human-in-the-loop triggers for every single command, or exploring other perimeter tools?
Links:
The Governance Gap
Warp is a high-performance execution environment, but agent frameworks are not designed to be security perimeters. In production, engineering teams require controls that are independent of the LLM
Is your feature request related to a problem? Please describe.
Currently, autonomous agents in the terminal lack a security perimeter that can enforce deterministic policies and provide an audit trail independent of the LLM's own reasoning. This gap makes it difficult for engineering teams to maintain governance over agent-led production changes.
Pre-submit Checks
No response
Operating system (OS)
macOS
How important is this feature to you?
3
Warp Internal (ignore) - linear-label:39cc6478-1249-4ee7-950b-c428edfeecd1
None