TaG
Health Uyari
- License — License: NOASSERTION
- Description — Repository has a description
- Active repo — Last push 0 days ago
- Low visibility — Only 5 GitHub stars
Code Gecti
- Code scan — Scanned 12 files during light audit, no dangerous patterns found
Permissions Gecti
- Permissions — No dangerous permissions requested
This framework acts as a local-first trust and governance layer for AI coding agents. It enforces runtime guardrails to prevent uncontrolled spending, credential leaks, and unauthorized deployments across multiple projects.
Security Assessment
The framework is designed to restrict agent actions and monitor sensitive data like credentials and environment variables. A light code scan across 12 files found no dangerous patterns, no hardcoded secrets, and no dangerously broad permissions requested. It claims to be completely local, requiring no hosted dependencies, accounts, or telemetry. The overall risk is rated as Low.
Quality Assessment
The project appears to be in active development, with its most recent push occurring today. However, community visibility and trust are currently very low, as evidenced by only 5 GitHub stars. Additionally, the repository lacks a clearly defined open-source license, marking it as "NOASSERTION." While this means you can review the code, the undefined legal status could be a hurdle for enterprise adoption or contribution.
Verdict
Use with caution—the code appears safe with no dangerous permissions, but the undefined license and minimal community traction mean it should be tested thoroughly before integrating into production environments.
Trust and Governance framework for AI coding agents. Local-first guardrails for spending, credentials, deployment, and cross-project isolation.
TaG -- Trust and Governance for Agentic Execution
Most AI tools are easy to start and hard to trust.
They can answer fast, write fast, and act fast. They can also go off scope, waste money, leak data, skip verification, and tell you a job is done when it is not.
TaG is the layer that makes AI usable in the real world.
It is designed to feel simple on the surface and strict underneath:
easy enough to step into,
strong enough to protect you from the rocks.
TaG is a local-first trust and governance layer for AI agents, sub-agents, and human operators working in the same execution system. It defines what an agent is allowed to do, what evidence it needs before claiming work is complete, and how work gets escalated when local execution is slow, wrong, or unsafe. TaG also provides a 3-layer persistent memory system that carries context across sessions and restarts, and a local operational dashboard for monitoring governance, memory, and hook status in real time.
The open-source core runs locally. No hosted dependency, no telemetry, no account.
What TaG Enforces
Runtime Governance
| Threat | Hook |
|---|---|
| Uncontrolled API/cloud spending | spending-guard |
| Credential leaks across scopes | credential-scope-guard |
| Deploying without passing build | build-gate |
| Deploying without security review | security-gate |
| Deploying without QA review | qa-gate |
| Agents reading/writing outside their fork | fork-scope-guard |
| Environment variable exposure | env-guard |
| Data exfiltration via web requests | webfetch-exfil-guard |
| Unauthorized OS-level access | os-acl-enforcer |
| Uncontrolled agent delegation | delegate-enforcer |
| Agent identity and assignment enforcement | agent-enforcer |
Additional operational hooks include session-autosave, crash-checkpoint, compaction-recovery, memory-autosave, and skill-autoload.
Engineering Protocol
TaG open core also includes universal engineering governance primitives:
verification-gateblocks final code-completion claims without passing verification evidencecompletion-claim-guardblocks final completion claims without evidence handlesrepo-hygiene-gateblocks completion and release claims when repo-hygiene state is missing, dirty, or incompleteplaywright-qa-gaterequires browser QA evidence for UI-facing completion claimsplaywright-security-gaterequires browser security evidence for preview and deploy-facing completion claims
Supporting surfaces in the repo include:
- coding protocol defaults in
tag/config/coding-protocol.json - verification evidence models in
tag/verification/ - Playwright starter templates
- model-agnostic verification playbooks
This is the open-core slice of workflow enforcement: verification before completion, repo hygiene before finalization, and browser QA/security evidence before UI or deploy-adjacent work can close.
Persistent Memory
TaG includes a 3-layer memory system that persists context across sessions, actors, and restarts.
| Layer | Purpose | Storage |
|---|---|---|
| Heartbeat | Real-time session state — what is happening right now | heartbeat.json |
| Engram | Consolidated rules, decisions, and patterns | engram.jsonl |
| Hindsight | Long-term searchable archive of all session history | hindsight.jsonl |
All memory lives under tag-runtime/context/ and requires no external database or service.
Usage
from tag.memory import Heartbeat, Engram, Hindsight, resolve_memory
# Layer 1: Heartbeat — track session activity
heartbeat = Heartbeat()
heartbeat.pulse(call_count=12, files_changed=["src/main.py"])
heartbeat.is_alive() # True if pulsed within 5 minutes
# Layer 2: Engram — save rules and recall by keyword
engram = Engram()
engram.save("Always run tests before deploy", tags=["workflow", "testing"])
engram.recall("deploy testing") # keyword search across content and tags
# Layer 3: Hindsight — long-term archive with search
hindsight = Hindsight()
hindsight.save("Deployed v2.1 to production", source="deploy-agent", tags=["deploy"])
hindsight.recall("production deploy") # search the archive
hindsight.stats() # {"total": N, "sources": {...}, "tags": {...}}
# Unified interface
memory = resolve_memory()
memory.status() # combined status of all 3 layers
Memory is populated automatically by TaG hooks (memory-autosave, session-autosave) and can be written to explicitly by any governed actor.
Dashboard
TaG ships with a local operational dashboard — no hosted service required.
The dashboard shows:
- Governance status — governed mode, authority matrix, active hooks
- Memory layers — heartbeat pulse, engram entries, hindsight archive stats
- Recent decisions — governance allow/hold/block log
- Hook status — which hooks are installed and active
Launch
python3 tag_serve.py
The dashboard opens at http://localhost:18800. Set TAG_UI_PORT to change the port.
How It Works
TaG hooks into the execution path before a governed action runs.
For each governed action or completion claim, TaG can evaluate:
- local policy
- local runtime state
- local evidence state
The result is one of:
- allow
- hold
- block
Actor
|
v
Action or completion claim
|
v
TaG hook
|
+--> policy check
+--> runtime-state check
+--> evidence check
|
v
Allow / Hold / Block
Policy is plain JSON. Governed state stays local. The open-source core does not require a server, account, or telemetry.
Final Escalation
TaG keeps escalation inside the same governed system.
Models and sub-agents attempt the work first under the current policy, scope, and verification requirements. If the task still cannot be resolved, it escalates upward through more capable actors. The human is the final escalation point.
When that happens, the human inherits the context of the escalation:
- what was attempted
- what failed
- why the task escalated
- what evidence exists
- what boundaries still apply
The human is not asked to reconstruct the problem from scratch. TaG preserves the history and hands over the task with context intact.
Why This Exists
AI agents now write code, run commands, manage credentials, call APIs, and move work toward release. Most systems still rely on broad permissions, weak scoping, and self-reported completion.
TaG exists to put governance in the execution path before the actor can do damage.
That means:
- before money is spent
- before credentials cross scope
- before a release moves without build, security, and QA gates
- before an actor crosses project boundaries
- before sensitive data leaves through a web request
- before work is declared complete without evidence
The actor stays useful. The actor stops being unchecked.
Open Core
TaG's governance core is open.
This repository includes:
- local trust and governance hooks
- workflow policy/compiler surfaces
- 3-layer persistent memory system (heartbeat, engram, hindsight)
- fork and runtime templates
- engineering protocol enforcement
- delivery phase-one primitives for setup and governed install state
- local operational dashboard
- launcher script (
tag_serve.py)
The broader product layer is separate and still evolving:
- hosted onboarding
- billing, fleet, and support surfaces
- cost-aware multi-provider routing
- continuity and failover behavior across deployments
That split is intentional. The governance core should be inspectable, runnable, and useful on its own.
TaG is model- and provider-agnostic by design, and enterprise deployments get access to cost-aware routing across latency, capability, and cost. Advanced continuity and failover behavior live in the product layer.
Example
If an agent tries to deploy without passing build, security, or QA gates, TaG blocks the action before it happens.
If an agent tries to access credentials owned by another fork, TaG blocks it and records the governed decision locally.
If an agent tries to send sensitive data to a known capture endpoint, TaG blocks the request before the data leaves.
If an actor tries to claim code is complete without verification evidence, or UI work is done without browser QA evidence, TaG can hold or block that completion path.
That is the point of the system: not post-hoc analysis, but governed execution.
Install
TaG is pure Python with no external dependencies. Clone and configure:
git clone https://github.com/AIObuilt/TaG.git
cd TaG
export TAG_HOME=$(pwd)
mkdir -p tag-runtime/config
cp tag/config/authority-matrix.template.json tag-runtime/config/authority-matrix.json
python3 tag_serve.py
The dashboard opens in your browser after setup.
Verify
Run the full TaG suite:
for test in agent-enforcement/test_tag_*.py; do python3 "$test"; done
python3 -m py_compile $(find tag -maxdepth 4 -name '*.py' -print)
Everything in the open core is standard-library Python.
Focused Verification
Core governance:
python3 agent-enforcement/test_tag_governance_hooks.py
python3 agent-enforcement/test_tag_spending_guard.py
python3 agent-enforcement/test_tag_env_guard.py
python3 agent-enforcement/test_tag_release_gates.py
python3 agent-enforcement/test_tag_policy_model.py
Engineering protocol:
python3 agent-enforcement/test_tag_verification_evidence.py
python3 agent-enforcement/test_tag_coding_protocol.py
python3 agent-enforcement/test_tag_completion_protocol.py
python3 agent-enforcement/test_tag_repo_hygiene_gate.py
python3 agent-enforcement/test_tag_playwright_templates.py
python3 agent-enforcement/test_tag_browser_protocol_gates.py
Memory system:
python3 agent-enforcement/test_tag_memory_heartbeat.py
python3 agent-enforcement/test_tag_memory_engram.py
python3 agent-enforcement/test_tag_memory_hindsight.py
python3 agent-enforcement/test_tag_memory_system.py
Delivery phase-one primitives:
python3 agent-enforcement/test_tag_delivery_paths.py
python3 agent-enforcement/test_tag_hosted_enrollment.py
python3 agent-enforcement/test_tag_bootstrap_manifest.py
python3 agent-enforcement/test_tag_setup_state.py
python3 agent-enforcement/test_tag_governed_install.py
python3 agent-enforcement/test_tag_delivery_ui.py
python3 agent-enforcement/test_tag_setup_server.py
Authority Matrix
The authority matrix maps forks and credential scopes to permitted resources:
{
"forks": {
"sales": { "directory": "sales/" },
"support": { "directory": "support/" }
},
"credential_scopes": {
"stripe": { "forks": ["sales"] },
"zendesk": { "forks": ["support"] },
"openai": { "forks": ["shared"] }
}
}
The sales fork can access Stripe credentials but not Zendesk, and vice versa. Violations are blocked and logged to local governed state under tag-runtime/.
License
Licensed under the Business Source License 1.1. Free for internal use within your organization. Commercial restrictions apply to reselling or offering TaG as a managed service.
About
TaG is built by AIO Built.
Contact: [email protected]
Contributing
Open an issue or submit a pull request. Keep the open core standard-library only unless there is a very strong reason to break that rule.
Yorumlar (0)
Yorum birakmak icin giris yap.
Yorum birakSonuc bulunamadi