Skip to content

BlastShield is in beta and may contain bugs. Validate it in a non-production environment before relying on it for safety-critical workflows.

BlastShield

Shrink the blast radius of your agentic engineering.

BlastShield enforces a default-deny posture for cloud CLIs. Read operations such as list, describe, get, and plan pass through automatically. Mutating commands such as terraform apply and gcloud deploy are blocked or forced back to the user.

The agent inspects and plans. You execute.

Kernel-level filesystem restrictions keep agents away from credential files, state, and protected paths.

Runtime guard wrappers intercept dangerous subcommands before they reach Terraform, gcloud, kubectl, and other CLIs.

Terminal window
git clone https://github.com/cdrxyz/blastshield.git
cd blastshield
export PATH="$PWD:$PATH"
blastshield claude --dangerously-skip-permissions