nomos
Health Warn
- License — License: Apache-2.0
- Description — Repository has a description
- Active repo — Last push 0 days ago
- Low visibility — Only 5 GitHub stars
Code Fail
- rm -rf — Recursive force deletion command in .github/workflows/ci.yml
- exec() — Shell command execution in .github/workflows/release.yml
- rm -rf — Recursive force deletion command in .github/workflows/release.yml
Permissions Pass
- Permissions — No dangerous permissions requested
This tool acts as a security firewall for AI coding agents. It intercepts, audits, and gates agent actions—such as shell commands, file access, and API requests—allowing users to explicitly allow, deny, or require approval before execution.
Security Assessment
Overall Risk: Low
The tool inherently processes sensitive data and intercepts shell commands, but this is strictly by design to prevent unauthorized agent actions. It does not request dangerous permissions or contain hardcoded secrets. The automated security scans flagged recursive force deletions (`rm -rf`) and shell executions (`exec()`) in the CI/CD GitHub Actions workflows. While these findings sound alarming, they are standard practices for cleanup steps in automated testing and release pipelines, not signs of malicious intent.
Quality Assessment
The project is licensed under the permissive Apache-2.0 license and was updated very recently, indicating active maintenance. However, it currently has extremely low community visibility with only 5 GitHub stars. Because it is a new and small project, it has not yet undergone widespread public auditing or community validation.
Verdict
Use with caution: The concept is highly beneficial for AI safety and the code appears clean, but the tool's early stage and lack of community adoption mean it should be tested in isolated environments before broader integration.
Execution firewall for AI coding agents (Claude Code, Codex, MCP). Blocks secret access, gates risky commands, and enforces allow/deny/approval before actions run.
|
Nomos |
Nomos is an execution firewall for AI agents.
Nomos lets developers and teams safely use Claude Code, Cursor, Codex, and MCP agents without giving them uncontrolled access to files, shell, GitHub, cloud APIs, secrets, or production systems.
It sits between the agent and real systems and enforces one decision at the execution boundary: ALLOW, DENY, or REQUIRE_APPROVAL.
Nomos can:
- block secret reads (
.env, credentials, key material) - deny dangerous shell commands (
rm -rf,terraform destroy,kubectl delete,git push) - approval-gate GitHub, Kubernetes, Terraform, and HTTP actions
- redact sensitive outputs before they reach the agent, logs, or audit sinks
- scan upstream MCP responses for prompt-injection patterns
- broker short-lived credentials so agents never hold raw secrets
- record replayable, hash-chained audit traces
Nomos is agent-agnostic and model-agnostic. It does not constrain reasoning. It governs execution authority, resource usage, and side effects.
One decision in one place
Real output from nomos policy explain against the checked-in quickstart fixtures:
$ nomos policy explain \
--action ./examples/quickstart/actions/deny-env.json \
--bundle ./examples/policies/safe.yaml
Agent requested:
fs.read file://workspace/.env
Decision:
DENY (reason_code = deny_by_rule)
Matched rules:
safe-deny-root-env
safe-deny-nested-env
Audit:
trace_id = quickstart-deny-env
policy_bundle_hash = 7ec7bd2481d8cb07eed2c21c21563a62e6fe6277ae8333d1cbf9c01bd8b0bafb
assurance_level = BEST_EFFORT
Minimal allowing change:
Adjust the requested action to match an allowlisted resource, or request approval.
Same pipeline whether the caller is Claude Code over MCP, Codex over MCP, or an HTTP-integrated agent. Same fingerprint, same decision, same audit record.
What Gets Blocked By Default
Examples of actions Nomos can block or approval-gate with starter policy bundles:
- read
.env - read
~/.ssh/id_rsa - print authorization headers
- run
rm -rf - run
terraform destroy - run
kubectl delete - run
git push origin main - call unknown external hosts
- mutate production resources without approval
Each of these is shaped by your own policies and configs — these are starter rules, not built-in enterprise packs.
Install
Homebrew (macOS)
brew install safe-agentic-world/nomos/nomos
Scoop (Windows)
scoop bucket add nomos https://github.com/safe-agentic-world/scoop-nomos
scoop install nomos
Build From Source (Go)
go install github.com/safe-agentic-world/nomos/cmd/nomos@latest
Shell Installer (macOS And Linux)
curl -fsSL https://raw.githubusercontent.com/safe-agentic-world/nomos/main/install.sh | sh
Try In 60 Seconds
After installing nomos, clone this repo to get the starter fixtures and run two policy tests — no Claude, Codex, or MCP setup needed:
git clone https://github.com/safe-agentic-world/nomos.git
cd nomos
nomos policy test \
--action ./examples/quickstart/actions/allow-readme.json \
--bundle ./examples/policies/safe.yaml
nomos policy test \
--action ./examples/quickstart/actions/deny-env.json \
--bundle ./examples/policies/safe.yaml
Expected output:
allow-readme.json -> ALLOW (matched: safe-read-workspace)
deny-env.json -> DENY (matched: safe-deny-root-env, safe-deny-nested-env)
Both runs print the same policy_bundle_hash, so you can verify the decision came from the bundle you expected.
Try It With Claude Code
Use the demo repo and Claude Code to see Nomos deny a sensitive file read:
git clone https://github.com/safe-agentic-world/demo-langchain-nomos.git
cd demo-langchain-nomos
claude mcp add --transport stdio --scope local nomos-demo -- nomos mcp -c "nomos\config.claude-demo.json"
claude mcp list
You should see nomos-demo.
Then open Claude in the repo:
claude
And ask:
Use Nomos to read .env from the repo root.
Nomos should deny the action.
You can also prove:
- a normal read succeeds through Nomos
git statusis allowedgit pushis denied
Try It With Codex
git clone https://github.com/safe-agentic-world/demo-langchain-nomos.git
cd demo-langchain-nomos
codex mcp add nomos-demo -- nomos mcp -c "nomos\config.demo.json"
codex mcp list
You should see nomos-demo.
Then open codex in the repo:
codex
And ask:
Use Nomos to read .env from the repo root.
Nomos should deny the action.
MCP-Native Agent Demo
Beyond coding agents, the same pipeline governs business agents reaching real systems over MCP. The retail support example compares the same agent before and after Nomos.
Before Nomos, the agent follows the customer request directly. A damaged-item refund plus extra compensation goes through with no execution boundary enforcing policy.
After Nomos, the exact same agent is routed through Nomos over MCP. Order lookup is still allowed, but refund handling is policy-governed and extra compensation can be denied or approval-gated based on your policy bundle.
Same agent, same user request, different outcome at the execution boundary.
To run it yourself, see demo-langchain-nomos and follow the before/after Nomos runbook.
Why Nomos Exists
Agents are useful, but they are still one bad tool call away from:
- wrong business actions (refunds, free bookings, sent messages) under prompt injection
- pushing code, shipping changes, or running destructive commands like
terraform destroy,git push origin main, orkubectl delete - changing or deleting files you did not ask them to touch
- using powerful credentials in ways you never intended
Without governance at the execution boundary, prompt injection, tool misuse, and over-broad credentials turn into real side effects fast. Nomos applies zero-trust controls at the moment an agent tries to do something real.
With Nomos:
- routed actions hit one control point before they happen
- the same normalized action gets the same decision under the same identity, environment, and policy bundle
- sensitive actions can be routed to manual approval
- agents do not need to hold long-lived enterprise credentials on the Nomos-governed path
- outputs can be redacted and governed actions produce audit evidence
- the same control model works across MCP and HTTP integrations
- behavior stays flexible because you shape it with your own policies and configs
Architecture In One Picture
flowchart LR
A[Agent or MCP Client] --> B[HTTP or MCP Boundary]
subgraph N[Nomos Execution Boundary]
B --> C[Verify Identity]
C --> D[Validate and Normalize Action]
D --> E[Evaluate Policy]
E --> F{Decision}
F -->|ALLOW| G[Execute]
F -->|REQUIRE_APPROVAL| H[Create Approval]
F -->|DENY| I[Return Denial]
G --> J[Redact and Cap Output]
H --> I
J --> K[Return Response]
E -.-> L[Audit and Telemetry]
G -.-> L
H -.-> L
I -.-> L
end
The flow is simple:
- an agent tries to do something real
- Nomos verifies who is asking and normalizes the action
- policy returns
ALLOW,DENY, orREQUIRE_APPROVAL - only allowed actions execute on the mediated path
- outputs are redacted before they come back
- audit evidence is recorded for the whole path
That same model works whether the agent reaches Nomos through MCP or HTTP.
Serve
MCP
Use Nomos as an MCP server when your agent client already knows how to use MCP tools.
Good fit for:
- Claude Code
- Codex-style tool clients
- OpenClaw-style MCP-connected agents
Nomos exposes governed tools such as:
nomos_fs_readnomos_fs_writenomos_apply_patchnomos_execnomos_http_request
Nomos advertises MCP tool names using a conservative cross-vendor-safe character set. Canonical policy and audit identity remains unchanged behind the tool surface, and legacy dotted tool names are still accepted for backward compatibility.
For MCP file tools, Nomos accepts canonical resources like file://workspace/README.md and now also accepts common workspace-relative shorthands like README.md or ./README.md, which are adapted safely into the canonical internal form.
See:
- docs/integration-kit.md
- docs/upstream-mcp-gateway.md
- docs/mcp-compatibility.md
- examples/local-tooling/claude-code-mcp.json
- examples/local-tooling/codex.mcp.json
Nomos can also run as an additive MCP governance gateway in front of configured upstream MCP servers. In that mode, downstream agents keep their MCP client architecture while Nomos governs forwarded tools as mcp.call actions. Upstream stdio compatibility is hardened for real newline-delimited JSON MCP servers, with framed upstream responses still accepted for compatibility.
HTTP
Use Nomos as an HTTP gateway when your agent runtime already has its own tool loop or backend service.
Good fit for:
- app-integrated agents
- custom tool runtimes
- CI or service-side control planes
Nomos exposes:
POST /actionPOST /runPOST /approvals/decidePOST /explainGET /ui/
with bearer principal auth and agent HMAC signing.
See:
- docs/deployment.md
- docs/http-sdk.md
- docs/http-integration-kit.md
- docs/integration-patterns.md
- docs/custom-actions.md
- docs/quickstart.md
- docs/operator-ui.md
Key Features
nomos doctor: deterministic preflight checks before agents connectnomos policy test: test a specific action against a policy bundle without executing itnomos policy explain: understand why an action was allowed, denied, or approval-gated- MCP server mode: expose governed tools to MCP-compatible agent clients
- HTTP gateway mode: mediate actions from custom tool loops and app backends
- approval workflow: route sensitive actions into narrow, fingerprint-bound approvals
- operator UI: inspect readiness, pending approvals, action detail, trace timelines, and explain-only policy results over existing gateway state
- audit trail: record governed actions with stable policy and identity context
- redaction: strip sensitive output before it reaches the agent, logs, or audit sinks
- capability contract: surface what is immediately allowed, approval-gated, or unavailable
- multi-bundle policy loading: compose layered policy packs with deterministic merge behavior
What Nomos Governs
Nomos can govern actions such as:
fs.readfs.writerepo.apply_patchprocess.execnet.http_requestsecrets.checkout
Policy returns:
ALLOWDENYREQUIRE_APPROVAL
Around those actions, Nomos adds:
- deterministic deny-wins policy evaluation
- approval binding to action fingerprints
- output caps and redaction
- audit events and telemetry hooks
- least-privilege identity and credential mediation
See:
Guarantees And Deployment Modes
Nomos makes different claims depending on where it is deployed. These are runtime-derived assurance levels, not marketing labels.
| Deployment mode | Guarantee | Meaning |
|---|---|---|
| controlled CI / k8s with strong controls | STRONG |
governed side effects can be enforced at the runtime boundary |
| partially hardened controlled runtime | GUARDED |
Nomos strongly mediates the path it sees, but operator/runtime gaps may remain |
| local unmanaged or remote-dev style usage | BEST_EFFORT |
Nomos governs routed actions, but cannot guarantee full mediation |
This matters because a local demo proves Nomos can govern the path it sees, while a hardened deployment proves much stronger control over what the agent can actually do.
See:
Starter Bundles And Examples
These are starter examples, not built-in enterprise policy packs.
Configs:
- examples/quickstart/config.quickstart.json
- examples/configs/config.example.json
- examples/configs/config.layered.example.json
Starter bundles:
- examples/policies/safe.yaml
- examples/policies/safe.json
- examples/policies/purchase.yaml
- examples/policies/all-fields.example.yaml
Security Model
Nomos is built around a few hard rules:
- no trust in agent-supplied principal or environment claims
- no raw enterprise credentials returned directly to agents
- credentials are brokered as short-lived lease IDs
- redaction happens before output leaves Nomos
- policy and config errors fail closed
- local unmanaged mediation is explicitly weaker than controlled-runtime mediation
See:
- docs/threat-model.md
- docs/redaction-guarantees.md
- docs/egress-and-identity.md
- docs/owasp-agentic-mapping.md
Why Not Just Use OPA, Vault, Or Sandboxes?
Those tools each solve a piece of the problem. Nomos puts them together at the moment an agent tries to do something real.
| Tool | What it solves | What Nomos adds |
|---|---|---|
| OPA | policy evaluation | agent action normalization, approvals, execution mediation, audit replay |
| Vault | secret storage | short-lived credential brokering without exposing raw secrets to agents |
| sandbox runtimes | process isolation | business policy, approvals, redaction, audit, MCP/HTTP integration |
| MCP servers | tool exposure | least-privilege governance, deny/approval decisions, output controls |
Testing
Quick validation:
go test ./...
nomos doctor -c ./examples/quickstart/config.quickstart.json --format json
nomos policy test --action ./examples/quickstart/actions/allow-readme.json --bundle ./examples/policies/safe.yaml
nomos policy test --action ./examples/quickstart/actions/deny-env.json --bundle ./examples/policies/safe.yaml
See:
More Use Cases
Coding Agents
- allow
git status - deny
git push - deny
.envreads - allow bounded patch application
Customer Operations Agents
- allow order lookup
- require approval for refunds or credits
- deny bulk customer export
CI Agents
- allow test execution
- deny release publishing outside policy
- require approval for production-impacting actions
See:
Docs Map
Start here:
- docs/quickstart.md
- docs/http-sdk.md
- docs/http-integration-kit.md
- docs/integration-patterns.md
- docs/custom-actions.md
- docs/integration-kit.md
- docs/local-test-plan.md
- docs/operator-ui.md
Policy and behavior:
Architecture and guarantees:
Security and standards:
- docs/threat-model.md
- docs/mcp-compatibility.md
- docs/release-verification.md
- docs/owasp-agentic-mapping.md
Project Status
Nomos is still pre-v1.0.0. The core model is usable today, but interfaces, policy surface, and integrations may still evolve before a stable v1.
Project governance:
Community And Contribution
- open an issue for bugs, gaps, integration requests, or deployment questions.
- Please do not open public issues for potential vulnerabilities, and report privately to maintainers.
- browse
good first issueif you want a place to start - read CONTRIBUTING.md if you want to help shape the project
Reviews (0)
Sign in to leave a review.
Leave a reviewNo results found