Skip to content

Governing autonomous agents in Warp - tool call interception + audit trail via SupraWall (MCP adapter) #9914

@wiserautomation

Description

@wiserautomation

Pre-submit Checks

  • I have searched Warp feature requests and there are no duplicates

  • - [x] I have searched Warp docs and my feature is not there

  • [ ]

  • ### Describe the solution you'd like?

  • Huge milestone on the open-source launch, Warp team. Shifting the terminal from a passive shell to an environment where agents like Claude Code have autonomous write access to production is a fundamental change in the dev workflow.

  • [ ]

  • As more of us move from "chatting with code" to "autonomous PR submission," a critical question emerges: What governs what the agent is actually permitted to execute?

  • [ ]

  • ### The Governance Gap

  • Warp is a high-performance execution environment, but agent frameworks are not designed to be security perimeters. In production, engineering teams require controls that are independent of the LLM's reasoning: pre-execution policy enforcement, budget caps, and immutable audit trails. Warp gives your agents a company; SupraWall gives them a constitution.

  • [ ]

  • ### Deterministic Tool Gating (MCP)

  • We built SupraWall as an open-source, framework-agnostic security perimeter. It wraps Claude Code via an MCP adapter and works inside Warp today with no changes needed to the terminal codebase. It intercepts tool calls before the terminal process is spawned.

  • [ ]

  • ```python

  • # pip install suprawall

  • from suprawall import secure_agent, Policy

  • [ ]

  • # Define deterministic constraints

  • policy = Policy(

  • max_daily_usd=10.00,

  • deny_regex=[".(DROP|DELETE)."], # Blocks destructive database commands

  • require_approval=["alembic upgrade", "python manage.py migrate"] # Pauses for review

  • )

  • [ ]

  • # Wrap the Warp agent via MCP

  • agent = secure_agent(warp_claude_code_agent, policy=policy)

  • [ ]

  • # Execution is now gated by the SupraWall perimeter

  • await agent.run("Refactor the production database schema.")

  • ```

  • [ ]

  • ### What it produces:

  • * Pre-execution interception: Every tool call is gated before execution, regardless of the agent's intent.

  • * RSA-signed audit logs: Every decision (ALLOW/DENY/APPROVAL) is signed and written to an append-only log.

  • * Compliance ready: Generates the technical evidence required for CISO review and EU AI Act (Art 9/14) conformity assessments.

  • [ ]

  • ### Open Question

  • How are other teams handling agent governance inside Warp? Are you rolling your own policy layers, using manual human-in-the-loop triggers for every single command, or exploring other perimeter tools?

  • [ ]

  • Links:

  • * GitHub: github.com/wiserautomation/SupraWall

  • * Docs: supra-wall.com

  • [ ]

  • ### Is your feature request related to a problem? Please describe.

  • Currently, autonomous agents in the terminal lack a security perimeter that can enforce deterministic policies and provide an audit trail independent of the LLM's own reasoning. This gap makes it difficult for engineering teams to maintain governance over agent-led production changes.

  • [ ]

  • ### Operating system (OS)

  • macOS

  • [ ]

  • ### How important is this feature to you?

  • 3

  • [ ]

  • ### Warp Internal (ignore) - linear-label:39cc6478-1249-4ee7-950b-c428edfeecd1

  • None### Pre-submit Checks

  • I have searched Warp feature requests and there are no duplicates

  • - [x] I have searched Warp docs and my feature is not there

  • [ ]

  • ### Describe the solution you'd like?

  • Huge milestone on the open-source launch, Warp team. Shifting the terminal from a passive shell to an environment where agents like Claude Code have autonomous write access to production is a fundamental change in the dev workflow.

  • [ ]

  • As more of us move from "chatting with code" to "autonomous PR submission," a critical question emerges: What governs what the agent is actually permitted to execute?

  • [ ]

  • ### The Governance Gap

  • Warp is a high-performance execution environment, but agent frameworks are not designed to be security perimeters. In production, engineering teams require controls that are independent of the LLM's reasoning: pre-execution policy enforcement, budget caps, and immutable audit trails. Warp gives your agents a company; SupraWall gives them a constitution.

  • [ ]

  • ### Deterministic Tool Gating (MCP)

  • We built SupraWall as an open-source, framework-agnostic security perimeter. It wraps Claude Code via an MCP adapter and works inside Warp today with no changes needed to the terminal codebase. It intercepts tool calls before the terminal process is spawned.

  • [ ]

  • ```python

  • # pip install suprawall

  • from suprawall import secure_agent, Policy

  • [ ]

  • # Define deterministic constraints

  • policy = Policy(

  • max_daily_usd=10.00,

  • deny_regex=[".(DROP|DELETE)."], # Blocks destructive database commands

  • require_approval=["alembic upgrade", "python manage.py migrate"] # Pauses for review

  • )

  • [ ]

  • # Wrap the Warp agent via MCP

  • agent = secure_agent(warp_claude_code_agent, policy=policy)

  • [ ]

  • # Execution is now gated by the SupraWall perimeter

  • await agent.run("Refactor the production database schema.")

  • ```

  • [ ]

  • ### What it produces:

  • * Pre-execution interception: Every tool call is gated before execution, regardless of the agent's intent.

  • * RSA-signed audit logs: Every decision (ALLOW/DENY/APPROVAL) is signed and written to an append-only log.

  • * Compliance ready: Generates the technical evidence required for CISO review and EU AI Act (Art 9/14) conformity assessments.

  • [ ]

  • ### Open Question

  • How are other teams handling agent governance inside Warp? Are you rolling your own policy layers, using manual human-in-the-loop triggers for every single command, or exploring other perimeter tools?

  • [ ]

  • Links:

  • * GitHub: github.com/wiserautomation/SupraWall

  • * Docs: supra-wall.com

  • ### Pre-submit Checks

  • * [x] I have searched Warp feature requests and there are no duplicates

  • * [x] I have searched Warp docs and my feature is not there

  • [ ]

  • ### Describe the solution you'd like?

  • Huge milestone on the open-source launch, Warp team. Shifting the terminal from a passive shell to an environment where agents like Claude Code have autonomous write access to production is a fundamental change in the dev workflow.

  • [ ]

  • As more of us move from "chatting with code" to "autonomous PR submission," a critical question emerges: What governs what the agent is actually permitted to execute?

  • [ ]

  • ### The Governance Gap

  • Warp is a high-performance execution environment, but agent frameworks are not designed to be security perimeters. In production, engineering teams require controls that are independent of the LLM's reasoning: pre-execution policy enforcement, budget caps, and immutable audit trails. Warp gives your agents a company; SupraWall gives them a constitution.

  • [ ]

  • ### Deterministic Tool Gating (MCP)

  • We built SupraWall as an open-source, framework-agnostic security perimeter. It wraps Claude Code via an MCP adapter and works inside Warp today with no changes needed to the terminal codebase. It intercepts tool calls before the terminal process is spawned.

  • [ ]

  • ```python

  • # pip install suprawall

  • from suprawall import secure_agent, Policy

  • [ ]

  • # Define deterministic constraints

  • policy = Policy(

  • max_daily_usd=10.00,

  • deny_regex=[".(DROP|DELETE)."], # Blocks destructive database commands

  • require_approval=["alembic upgrade", "python manage.py migrate"] # Pauses for review

  • )

  • [ ]

  • # Wrap the Warp agent via MCP

  • agent = secure_agent(warp_claude_code_agent, policy=policy)

  • [ ]

  • # Execution is now gated by the SupraWall perimeter

  • await agent.run("Refactor the production database schema.")

  • ```

  • [ ]

  • ### What it produces:

  • - Pre-execution interception: Every tool call is gated before execution, regardless of the agent's intent.

  • - RSA-signed audit logs: Every decision (ALLOW/DENY/APPROVAL) is signed and written to an append-only log.

  • - Compliance ready: Generates the technical evidence required for CISO review and EU AI Act (Art 9/14) conformity assessments.

  • [ ]

  • ### Open Question

  • How are other teams handling agent governance inside Warp? Are you rolling your own policy layers, using manual human-in-the-loop triggers for every single command, or exploring other perimeter tools?

  • [ ]

  • Links:

  • - GitHub: github.com/wiserautomation/SupraWall

  • - Docs: supra-wall.com

  • [ ]

  • ### Is your feature request related to a problem? Please describe.

  • Currently, autonomous agents in the terminal lack a security perimeter that can enforce deterministic policies and provide an audit trail independent of the LLM's own reasoning. This gap makes it difficult for engineering teams to maintain governance over agent-led production changes.

  • [ ]

  • ### Operating system (OS)

  • macOS

  • [ ]

  • ### How important is this feature to you?

  • 3

  • [ ]

  • ### Warp Internal (ignore) - linear-label:39cc6478-1249-4ee7-950b-c428edfeecd1

  • None- [ ] ### Is your feature request related to a problem? Please describe.

  • Currently, autonomous agents in the terminal lack a security perimeter that can enforce deterministic policies and provide an audit trail independent of the LLM's own reasoning. This gap makes it difficult for engineering teams to maintain governance over agent-led production changes.

  • [ ]

  • ### Operating system (OS)

  • macOS

  • [ ]

  • ### How important is this feature to you?

  • 3

  • [ ]

  • ### Warp Internal (ignore) - linear-label:39cc6478-1249-4ee7-950b-c428edfeecd1

  • None### Pre-submit Checks

  • I have searched Warp feature requests and there are no duplicates

  • I have searched Warp docs and my feature is not there

Describe the solution you'd like?

Huge milestone on the open-source launch, Warp team. Shifting the terminal from a passive shell to an environment where agents like Claude Code have autonomous write access to production is a fundamental change in the dev workflow.

As more of us move from "chatting with code" to "autonomous PR submission," a critical question emerges: What governs what the agent is actually permitted to execute?'s reasoning: pre-execution policy enforcement, budget caps, and immutable audit trails. Warp gives your agents a company; SupraWall gives them a constitution.

Deterministic Tool Gating (MCP)### Pre-submit Checks

  • I have searched Warp feature requests and there are no duplicates
  • - [x] I have searched Warp docs and my feature is not there
  • [ ]
  • ### Describe the solution you'd like?
  • [ ]
  • Huge milestone on the open-source launch, Warp team. Shifting the terminal from a passive shell to an environment where agents like Claude Code have autonomous write access to production is a fundamental change in the dev workflow.
  • [ ]
  • As more of us move from "chatting with code" to "autonomous PR submission," a critical question emerges: What governs what the agent is actually permitted to execute?
  • [ ]
  • ### The Governance Gap
  • Warp is a high-performance execution environment, but agent frameworks are not designed to be security perimeters. In production, engineering teams require controls that are independent of the LLM's reasoning: pre-execution policy enforcement, budget caps, and immutable audit trails. Warp gives your agents a company; SupraWall gives them a constitution.
  • [ ]
  • ### Deterministic Tool Gating (MCP)### Pre-submit Checks
  • - [x] I have searched Warp feature requests and there are no duplicates
  • - [x] I have searched Warp docs and my feature is not there
  • [ ]
  • ### Describe the solution you'd like?
  • Huge milestone on the open-source launch, Warp team. Shifting the terminal from a passive shell to an environment where agents like Claude Code have autonomous write access to production is a fundamental change in the dev workflow.
  • [ ]
  • As more of us move from "chatting with code" to "autonomous PR submission," a critical question emerges: What governs what the agent is actually permitted to execute?
  • [ ]
  • ### The Governance Gap
  • Warp is a high-performance execution environment, but agent frameworks are not designed to be security perimeters. In production, engineering teams require controls that are independent of the LLM's reasoning: pre-execution policy enforcement, budget caps, and immutable audit trails. Warp gives your agents a company; SupraWall gives them a constitution.
  • [ ]
  • ### Deterministic Tool Gating (MCP)
  • We built SupraWall as an open-source, framework-agnostic security perimeter. It wraps Claude Code via an MCP adapter and works inside Warp today with no changes needed to the terminal codebase. It intercepts tool calls before the terminal process is spawned.
  • [ ]
  • ```python
  • # pip install suprawall
  • from suprawall import secure_agent, Policy
  • [ ]
  • # Define deterministic constraints
  • policy = Policy(
  • max_daily_usd=10.00,
  • deny_regex=[".(DROP|DELETE)."], # Blocks destructive database commands
  • require_approval=["alembic upgrade", "python manage.py migrate"] # Pauses for review
  • )
  • [ ]
  • # Wrap the Warp agent via MCP
  • agent = secure_agent(warp_claude_code_agent, policy=policy)
  • [ ]
  • # Execution is now gated by the SupraWall perimeter
  • await agent.run("Refactor the production database schema.")
  • ```
  • [ ]
  • ### What it produces:
  • * Pre-execution interception: Every tool call is gated before execution, regardless of the agent's intent.
  • * RSA-signed audit logs: Every decision (ALLOW/DENY/APPROVAL) is signed and written to an append-only log.
  • * Compliance ready: Generates the technical evidence required for CISO review and EU AI Act (Art 9/14) conformity assessments.
  • [ ]
  • ### Open Question
  • How are other teams handling agent governance inside Warp? Are you rolling your own policy layers, using manual human-in-the-loop triggers for every single command, or exploring other perimeter tools?
  • [ ]
  • Links:
  • * GitHub: github.com/wiserautomation/SupraWall
  • * Docs: supra-wall.com
  • [ ]
  • ### Is your feature request related to a problem? Please describe.
  • Currently, autonomous agents in the terminal lack a security perimeter that can enforce deterministic policies and provide an audit trail independent of the LLM's own reasoning. This gap makes it difficult for engineering teams to maintain governance over agent-led production changes.
  • [ ]
  • ### Operating system (OS)
  • macOS
  • [ ]
  • ### How important is this feature to you?
  • 3
  • [ ]
  • ### Warp Internal (ignore) - linear-label:39cc6478-1249-4ee7-950b-c428edfeecd1
  • None
  • - [ ] We built SupraWall as an open-source, framework-agnostic security perimeter. It wraps Claude Code via an MCP adapter and works inside Warp today with no changes needed to the terminal codebase. It intercepts tool calls before the terminal process is spawned.
  • [ ]
  • ```python
  • # pip install suprawall
  • from suprawall import secure_agent, Policy
  • [ ]
  • # Define deterministic constraints
  • policy = Policy(
  • max_daily_usd=10.00,
  • deny_regex=[".(DROP|DELETE)."], # Blocks destructive database commands
  • require_approval=["alembic upgrade", "python manage.py migrate"] # Pauses for review
  • )
  • [ ]
  • # Wrap the Warp agent via MCP
  • agent = secure_agent(warp_claude_code_agent, policy=policy)
  • [ ]
  • # Execution is now gated by the SupraWall perimeter
  • await agent.run("Refactor the production database schema.")
  • ```
  • [ ]
  • ### What it produces:
  • * Pre-execution interception: Every tool call is gated before execution, regardless of the agent's intent.
  • * RSA-signed audit logs: Every decision (ALLOW/DENY/APPROVAL) is signed and written to an append-only log.
  • * Compliance ready: Generates the technical evidence required for CISO review and EU AI Act (Art 9/14) conformity assessments.
  • [ ]
  • ### Open Question
  • How are other teams handling agent governance inside Warp? Are you rolling your own policy layers, using manual human-in-the-loop triggers for every single command, or exploring other perimeter tools?
  • [ ]
  • Links:
  • * GitHub: github.com/wiserautomation/SupraWall
  • * Docs: supra-wall.com
  • [ ]
  • ### Is your feature request related to a problem? Please describe.
  • [ ]
  • Currently, autonomous agents in the terminal lack a security perimeter that can enforce deterministic policies and provide an audit trail independent of the LLM's own reasoning. This gap makes it difficult for engineering teams to maintain governance over agent-led production changes.We built SupraWall as an open-source, framework-agnostic security perimeter. It wraps Claude Code via an MCP adapter and works inside Warp today with no changes needed to the terminal codebase. It intercepts tool calls before the terminal process is spawned.
# pip install suprawall
from suprawall import secure_agent, Policy

# Define deterministic constraints
policy = Policy(
    max_daily_usd=10.00,
    deny_regex=[".*(DROP|DELETE).*"], # Blocks destructive database commands
    require_approval=["alembic upgrade", "python manage.py migrate"] # Pauses for review
)

# Wrap the Warp agent via MCP
agent = secure_agent(warp_claude_code_agent, policy=policy)

# Execution is now gated by the SupraWall perimeter
await agent.run("Refactor the production database schema.")

What it produces:

  • Pre-execution interception: Every tool call is gated before execution, regardless of the agent's intent.
    • RSA-signed audit logs: Every decision (ALLOW/DENY/APPROVAL) is signed and written to an append-only log.
      • Compliance ready: Generates the technical evidence required for CISO review and EU AI Act (Art 9/14) conformity assessments.

Open Question

How are other teams handling agent governance inside Warp? Are you rolling your own policy layers, using manual human-in-the-loop triggers for every single command, or exploring other perimeter tools?

Links:

The Governance Gap

Warp is a high-performance execution environment, but agent frameworks are not designed to be security perimeters. In production, engineering teams require controls that are independent of the LLM

Is your feature request related to a problem? Please describe.

Currently, autonomous agents in the terminal lack a security perimeter that can enforce deterministic policies and provide an audit trail independent of the LLM's own reasoning. This gap makes it difficult for engineering teams to maintain governance over agent-led production changes.

Pre-submit Checks

  • I have searched Warp feature requests and there are no duplicates
  • - [x] I have searched Warp docs and my feature is not there
  • [ ]
  • ### Describe the solution you'd like?
  • Huge milestone on the open-source launch, Warp team. Shifting the terminal from a passive shell to an environment where agents like Claude Code have autonomous write access to production is a fundamental change in the dev workflow.
  • [ ]
  • As more of us move from "chatting with code" to "autonomous PR submission," a critical question emerges: What governs what the agent is actually permitted to execute?
  • [ ]
  • ### The Governance Gap
  • Warp is a high-performance execution environment, but agent frameworks are not designed to be security perimeters. In production, engineering teams require controls that are independent of the LLM's reasoning: pre-execution policy enforcement, budget caps, and immutable audit trails. Warp gives your agents a company; SupraWall gives them a constitution.
  • [ ]
  • ### Deterministic Tool Gating (MCP)
  • We built SupraWall as an open-source, framework-agnostic security perimeter. It wraps Claude Code via an MCP adapter and works inside Warp today with no changes needed to the terminal codebase. It intercepts tool calls before the terminal process is spawned.
  • [ ]
  • ```python
  • # pip install suprawall
  • from suprawall import secure_agent, Policy
  • [ ]
  • # Define deterministic constraints
  • policy = Policy(
  • max_daily_usd=10.00,
  • deny_regex=[".(DROP|DELETE)."], # Blocks destructive database commands
  • require_approval=["alembic upgrade", "python manage.py migrate"] # Pauses for review
  • )
  • [ ]
  • # Wrap the Warp agent via MCP
  • agent = secure_agent(warp_claude_code_agent, policy=policy)
  • [ ]
  • # Execution is now gated by the SupraWall perimeter
  • await agent.run("Refactor the production database schema.")
  • ```
  • [ ]
  • ### What it produces:
  • * Pre-execution interception: Every tool call is gated before execution, regardless of the agent's intent.
  • * RSA-signed audit logs: Every decision (ALLOW/DENY/APPROVAL) is signed and written to an append-only log.
  • * Compliance ready: Generates the technical evidence required for CISO review and EU AI Act (Art 9/14) conformity assessments.
  • [ ]
  • ### Open Question
  • How are other teams handling agent governance inside Warp? Are you rolling your own policy layers, using manual human-in-the-loop triggers for every single command, or exploring other perimeter tools?
  • [ ]
  • Links:
  • * GitHub: github.com/wiserautomation/SupraWall
  • * Docs: supra-wall.com
  • [ ]
  • ### Is your feature request related to a problem? Please describe.
  • Currently, autonomous agents in the terminal lack a security perimeter that can enforce deterministic policies and provide an audit trail independent of the LLM's own reasoning. This gap makes it difficult for engineering teams to maintain governance over agent-led production changes.
  • [ ]
  • ### Operating system (OS)
  • macOS
  • [ ]
  • ### How important is this feature to you?
  • 3
  • [ ]
  • ### Warp Internal (ignore) - linear-label:39cc6478-1249-4ee7-950b-c428edfeecd1
  • None### Additional context

No response

Operating system (OS)

macOS

How important is this feature to you?

3

Warp Internal (ignore) - linear-label:39cc6478-1249-4ee7-950b-c428edfeecd1

None

Metadata

Metadata

Assignees

No one assigned

    Labels

    area:agentAgent workflows, conversations, prompts, cloud mode, and AI-specific UI.area:mcpMCP server integrations, tool connections, and resource providers.area:warp-driveWarp Drive objects, sync, sharing, cloud object management, and persisted artifacts.enhancementNew feature or request.repro:unknownThe report does not provide enough evidence to estimate reproducibility yet.triagedIssue has received an initial automated triage pass.

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions