v2.4.0 · learn-and-lock contracts CNCF Landscape · Security & Compliance

Open-source agent firewall for MCP and AI agent egress

Pipelock enforces MCP, HTTP, and WebSocket egress at the network boundary and produces verifiable audit evidence for every inspected action.

install
$ brew install luckyPipewrench/tap/pipelock
# Then protect Claude Code
$ pipelock claude setup
# Generate a signed assessment
$ pipelock assess init && pipelock assess run assessment-*/

v2.4.0 ships · learn-and-lock contracts · block reason headers · inbound envelope verification

342+

GitHub Stars

15400+

Tests

40

Releases

~20MB

Single Binary

151

Bench Cases

5

Frameworks

CNCF Landscape · April 2026

Pipelock is currently the only AI-agent-firewall listed under Provisioning · Security & Compliance.

Listed via cncf/landscape#4807 · category: provisioning · security-compliance

View listing

Narrative

Detect. Enforce. Prove.

One binary, three jobs. Each line below is a real surface in the Pipelock source tree.

Detect

11-layer scanner pipeline. 48 DLP patterns. A2A scanning. Encoded payload handling across HTTP, WebSocket, and MCP.

11 layers 48 DLP patterns 25 injection

Enforce

OR-composed kill switch. Adaptive escalation. Process sandbox on Linux and macOS. MCP tool policy with redirect. Fail-closed on every path.

4 kill sources 3 escalation levels fail-closed

Prove

Evidence for every machine operation. Hash-chained flight recorder. Ed25519-signed assessment reports. 24+ attack simulations.

5 frameworks Ed25519 signed offline verify

Get Started

Two minutes to protection

Works with Claude Code, Cursor, VS Code, JetBrains, or any agent that speaks HTTP.

claude-code
$ brew install luckyPipewrench/tap/pipelock
# Wire Claude Code through Pipelock
$ pipelock claude setup
✓ HTTPS_PROXY configured · scanner running

Public methodology · Public attack cases · Public Pipelock results