by efij
Security guardrails for Claude Code, MCP tools, and Claude cowork workflows. Local-first modular YARA-style guard packs for secrets, exfiltration, prompt injection, MCP abuse, and risky agent actions.
# Add to your Claude Code skills
git clone https://github.com/efij/secure-claude-codeRuntime security for Claude Code, Codex, and MCP-native coding clients. Protect shell, git, MCP, secrets, plugins, skills, and risky agent actions before they turn into damage.
Runwall adds a practical security layer around coding-agent runtimes to reduce prompt injection fallout, secret leakage, unsafe command execution, dangerous git operations, and risky MCP, plugin, or skill configurations.
It now does both:
It is built for solo builders, startups, security-minded teams, and larger orgs that want safer defaults around AI coding workflows.
Coding agents are useful because they can read files, run shell commands, use git, connect to MCP tools, and increasingly work across more than one runtime.
That is also exactly why they need guardrails.
Runwall helps reduce real-world risk around:
It is practical, transparent, and built for real developer environments.
Runwall now supports four integration styles:
Runwall helps you:
It works well on top of Claude Code sandbox mode too. Sandboxing helps contain damage. Runwall adds guard logic on top of that containment layer.
It is much less relevant for plain chat-only usage where no tools, shell, git, or file actions are involved.
The cleanest install path is now the plugin or bundle path for the runtime you already use.
/plugin marketplace add efij/secure-claude-code
/plugin install runwall@runwall
This repo now ships a Codex bundle manifest in .codex-plugin/plugin.json and a shared MCP definition in .mcp.json.
If your Codex supports local plugin or bundle install, install this repo directly as runwall and restart Codex.
If you want the manual fallback:
./bin/runwall generate-runtime-config codex balanced
OpenClaw can install this repo directly as a compatible bundle because it detects Claude and Codex bundle markers and imports supported skills and MCP tools.
openclaw plugins install ./secure-claude-code
openclaw plugins list
openclaw plugins inspect runwall
openclaw gateway restart
Use the CLI path when you want profile switching, update, uninstall, doctor repair, runtime config generation, or a separate local install home.
Generate a Cursor-ready mcp.json:
./bin/runwall generate-runtime-config cursor balanced
Then place that output in the MCP config file Cursor expects on your machine. It now points at the inline Runwall gateway instead of the older helper-only companion server.
Generate a Windsurf-ready mcp_config.json:
./bin/runwall generate-runtime-config windsurf balanced
Then place that output in the MCP config file Windsurf expects on your machine. It now points at the inline Runwall gateway instead of the older helper-only companion server.
Generate a Claude Desktop-ready claude_desktop_config.json:
./bin/runwall generate-runtime-config claude-desktop balanced
Then merge that output into your Claude Desktop MCP config. It now points at the inline Runwall gateway instead of the older helper-only companion server.
curl -fsSL https://raw.githubusercontent.com/efij/secure-claude-code/main/scripts/bootstrap.sh | bash -s -- --repo efij/secure-claude-code --ref main --profile balanced
irm https://raw.githubusercontent.com/efij/secure-claude-code/main/scripts/bootstrap.ps1 | iex; Install-Runwall -Repo "efij/secure-claude-code" -Ref "main" -Profile "balanced"
git clone https://github.com/efij/secure-claude-code.git
cd secure-claude-code
./bin/runwall install balanced
install.sh, update.sh, and uninstall.sh still exist, but they are only thin compatibility wrappers around the main CLI.
./bin/runwall install balanced
./bin/runwall audit .
./bin/runwall audit . --format html --output runwall-audit.html
./bin/runwall audit . --format sarif --output runwall-audit.sarif --fail-on high
./bin/runwall doctor
./bin/runwall validate
./bin/runwall list protections
./bin/runwall list runtimes
./bin/runwall logs 20
./bin/runwall logs 50 --json
./bin/runwall gateway serve strict --config ./config/gateway.json --api-port 9470
Then open http://127.0.0.1:9470 to inspect events, redactions, and pending approvals.
The dashboard now makes three flows explicit:
It also shows:
./bin/runwall init .
That creates:
.runwall/audit-baseline.json.github/workflows/runwall-audit.ymlRunwall is now structured around runtime adapters, bundle installs, and the inline MCP gateway:
Claude Code: native hook mode with direct pre-tool and post-tool enforcementCodex: plugin bundle plus inline gateway fallback modeOpenClaw: compatible bundle install that maps Runwall skills and MCP tools into OpenClawCursor: generated mcp.json gateway configWindsurf: generated mcp_config.json gateway configClaude Desktop: generated `claudNo comments yet. Be the first to share your thoughts!