
50-pattern denylist, Day 1.
DROP TABLE without WHERE. rm -rf outside sandbox. git force-push to main. AWS s3 rb. We ship 50 patterns Day 1. Cross-customer pattern DB grows weekly.
SQL.drop_tableshell.rm_rfgit.force_pushaws.s3_rbAgent Firewall · keep-yolo-mode
Stop choosing between speed and safety. Hard-deny patterns block instantly; medium-risk calls escalate to your phone for approve/deny in seconds.
PromiseYour team keeps --dangerously-skip-permissions on, ships fast, and the firewall catches the 1% of calls that would cause a real incident.

Could've been prevented · 10+ documented agent-destruction incidents · Oct 2024 — Apr 2026
// agent reasoning
// > clean up old user records before migration
$ tool_call(execute_sql, { query: "DROP TABLE users;" })
[firewall] match: sql.drop_table_no_where · severity=critical · pattern_id=SQL-007[firewall] VERDICT: BLOCKED · agent halted · 18ms
// notification posted to telegram://team/agent-firewall
// audit row: intercepts/01HXR5K2…
$ Evidence
Cursor proposed a destructive SQL call at 04:12 UTC. Pattern SQL-007 matched in 18ms. Verdict: BLOCKED. The agent halted; the database stayed.
Proof
Same denylist that would have caught the PocketOS wipe, the Replit code-freeze incident, and the Antigravity event. 50-pattern starter list ships Day 1; cross-customer pattern DB grows weekly.
Three steps · sixty seconds
The pain on your team today — Removing --dangerously-skip-permissions slows the team down; keeping it on means one chain-of-thought from disaster.
One npm install. Drop the MCP wrap into your agent config or wrap your SDK call. 60 seconds.
npm i @agentfirewall/sdkEvery tool call gets scanned against 50 hard-deny patterns. Critical matches halt instantly. Medium-risk escalates to Telegram.
verdict: blocked · 18msCustom per-tool guardrails fragment across Cursor / Claude Code / Devin and break on every vendor update.
policy: balanced · 30s timeoutThe control plane
Read-only observability tools tell you what happened. Agent Firewall stops it from happening.

DROP TABLE without WHERE. rm -rf outside sandbox. git force-push to main. AWS s3 rb. We ship 50 patterns Day 1. Cross-customer pattern DB grows weekly.
SQL.drop_tableshell.rm_rfgit.force_pushaws.s3_rb
Medium-risk calls escalate to your phone in seconds. Tap Approve, tap Deny, or set 'Approve always for this pattern'. Fail-closed by default — uncertainty never auto-allows.
ApproveDenyApprove always30s timeout
MCP server + SDK wrap. Works with Cursor, Claude Code, Devin, Replit Agent, Cline, Continue, and any custom agent loop. One policy layer, every tool.
CursorClaude CodeDevinReplitClineIncident wall · selected
Cursor-driven Claude wiped production DB and backups in 9 seconds.
Tom's Hardware · Fast Company · ABC News · The Register
Replit Agent wiped 1,206 executive records during an explicit code-freeze window.
TechCrunch · Hacker News · Replit blog post-mortem
Agent loop ran rm -rf inside the repo root after misreading a cleanup task.
Antigravity engineering blog · Twitter thread
RCE via crafted MCP server payload — agent invoked attacker-controlled shell on host.
NVD · Snyk advisory
One blocked incident pays 50 years of subscription.
Pricing
Free tier covers 10 intercepts/day per team — enough to confirm the firewall is wired before you decide.
Solo
$19/mo
One developer. Local SDK or single-agent MCP.
Team
$49/mo
10-50 person engineering team. Cross-vendor team policy.
Pro
$99/mo
Compliance-grade audit, SSO, custom pattern engine.
FAQ
Still have one we didn't list? Open an issue on GitHub and we'll respond.
Hard-deny patterns evaluate in <50ms p99 — a stateless regex/AST match with no network round-trip. The only call that pauses is a medium-risk escalation to Telegram, capped at a 30-second timeout (default-deny on expiry). Everything below medium-risk passes through.
Ship the firewall before the incident
Stop choosing between speed and safety. Hard-deny patterns block instantly; medium-risk calls escalate to your phone for approve/deny in seconds.
Free tier · no credit card · 60-second install