Integrate Clampd in 3 lines. Python, TypeScript, any framework.
1-line integration for OpenAI, Anthropic, LangChain, Google ADK, and any function.
Add check_response=True to also inspect tool responses for PII, data anomalies, or poisoned data. Off by default — zero overhead unless enabled.
1-line integration for OpenAI, Anthropic, and any async function.
A standalone CLI for managing your Clampd cluster from the terminal. Inspect agents, trigger kills, import policies, stream audit logs, and monitor everything with a live TUI dashboard.
Download the pre-built binary for your platform. The CLI connects to your Clampd cluster and validates your license on startup.
| Command | Description |
|---|---|
clampd agent list | List all registered agents with state and risk |
clampd kill <agent-id> | Emergency kill switch |
clampd policy list | Show active policies |
clampd watch | Live TUI dashboard — real-time monitoring |
clampd demo | Run live demo with real threat detection |
Manage multiple environments with named contexts — like kubectl config. Each context stores an endpoint, org ID, and credentials. Switch instantly between local, staging, and production.
Stored at ~/.clampd/config.toml. Contexts replace the old flat config — existing configs auto-migrate.
A multi-stage runtime security layer sits between your agents and their tools. Every tool call is authenticated, classified, policy-checked, and audited.
┌─────────────────┐ ┌──────────────────────────────────────────────────┐ ┌──────────────┐ │ LLM / Agent │────▶│ Clampd Security Pipeline │────▶│ Your Tool │ │ (LangChain, │ │ │ │ (DB, API, │ │ ADK, MCP) │◀────│ Authenticate → Classify → Evaluate → Audit │◀────│ File, MCP) │ └─────────────────┘ │ <25ms p95 latency │ └──────────────┘ └──────────────────────────────────────────────────┘
Actual log output from Docker. See exactly what happens when a request flows through the proxy.
Comprehensive built-in rules detect common attack patterns against AI agents. Configurable risk thresholds. Shown below are example threat categories — the full rule set is extensive.
| Category | Detects | Example | Risk |
|---|---|---|---|
| Destructive SQL | DROP, TRUNCATE, DELETE without WHERE | DROP TABLE users | Critical |
| Credential Access | Attempts to read secrets, keys, tokens | .env, .ssh, credentials | Critical |
| SSRF / Cloud Metadata | Internal network probing, metadata endpoints | 169.254.169.254/... | High |
| Injection Attacks | SQL injection, NoSQL injection, LDAP, SSTI | WHERE 1=1; DROP ... | High |
| Prompt Injection | Attempts to override agent instructions | ignore previous instructions | High |
| PII Exfiltration | SSN, credit cards, personal data leaks | SSN: ***-**-**** | High |
| Shell Exploits | Reverse shells, dangerous commands, code exec | rm -rf /, bash -i | Critical |
| XSS / Path Traversal | Script injection, directory escape | <script>, ../../etc | High |
+ many more categories including DNS exfiltration, crypto mining, agent impersonation, and more.
Every event is recorded. Query your audit trail with standard SQL.
| tool_name | blocked | assessed_risk | denial_reason |
|---|---|---|---|
| database.query | true | high | destructive SQL |
| database.query | false | low | |
| file.read | true | high | path traversal |
| file.read | false | low | |
| http.fetch | true | high | SSRF detected |
| http.fetch | false | low | |
| shell.exec | true | critical | dangerous command |
| shell.exec | false | low |
When Clampd approves a tool call, it mints a short-lived, single-use micro-token and forwards it to your tool service via the Authorization: Bearer <token> header. Your tool service should validate this token before executing any action.
| Property | Description |
|---|---|
sub | Agent ID that initiated the tool call |
scope | Space-separated list of scopes the agent is allowed (e.g. db:read) |
exp | Expiry timestamp — tokens expire in 30 seconds |
jti | Unique token ID — each token can only be used once |
ag:tool_binding | Hash binding the token to a specific tool descriptor |
ag:session_id | Session ID (optional) for correlating calls within a session |
ag:trust_level | Trust level (optional) — present when operating in degraded mode |
The recommended approach is to call the Clampd Introspect endpoint, which verifies the signature, checks expiry, enforces single-use, and confirms the agent is not on the deny list — all in one call.
| Field | Type | Description |
|---|---|---|
active | boolean | true if the token is valid and consumable |
sub | string | Agent ID |
scope | string | Space-separated scopes |
exp | integer | Expiry (Unix timestamp) |
tool_binding | string | Tool descriptor binding hash |
reason | string? | Why the token was rejected (only when active is false) |
Tokens are single-use: once introspected, the nonce is consumed and the same token cannot be used again. If your tool service does not call Introspect, the token expires automatically after 30 seconds.