Write policies in code. Watch them enforce in real time. Hand the signed audit bundle to your compliance team. All from the same workspace, attributed and reversible.
package trustops.tools
default allow := true
destructive := [
"rm -rf",
"mkfs",
"dd of=/dev/",
]
deny[msg] {
input.tool == "Bash"
some p in destructive
contains(input.command, p)
msg := sprintf("destructive command: %q", [p])
}
deny[msg] {
input.tool == "Read"
endswith(input.path, ".aws/credentials")
msg := "secret file access blocked"
}The flow below is the same flow your team will use the first day. Real Rego, real hash chain, real deny.
Pick from a template library or write your own Rego. Test it inline against a sample tool-call before saving. Version-controlled per project.
deny[msg] {
input.tool == "Read"
endswith(input.path, ".env")
msg := "blocked: secret file"
}Installed in one bash command, the trustops-agent hooks into Claude Code's PreToolUse event. Denials happen before execution. Latency is sub-millisecond.
Each log entry is hash-chained to the previous and signed with the agent's Ed25519 key. Export a JSON or PDF bundle in one click. Auditors verify offline.
$ curl -sSL https://app.trustops.eu/install.sh \ | sudo TRUSTOPS_TOKEN=oat_xxx bash
TrustOps composes well-understood pieces: Open Policy Agent for evaluation, Ed25519 for signing, SHA-256 for chaining, plain JSON for export. Your auditor can verify the chain with 40 lines of Node.
"Every other governance vendor showed me a dashboard. TrustOps was the first that handed me a verifiable bundle."
No per-seat surprises. No per-decision metering. The agent runs on your machines.
For teams evaluating policy enforcement on AI agents.
For teams running AI agents in production.
For regulated industries with custom compliance needs.
TrustOps gives you the full agent loop on top of OPA: the trustops-agent runtime, the PreToolUse hook installation, the cryptographic log chain, the audit bundle export, and the dashboard. OPA is the engine; TrustOps is the surrounding compliance product.
On your infrastructure. The platform deploys via docker compose into your own cluster or VM. No data leaves your perimeter. Self-hosted by default; an enterprise option offers an air-gapped install.
Anything that respects a PreToolUse hook in a .claude/settings.json file. That covers Claude Code, the Anthropic Agent SDK, and forks. Support for OpenAI Assistants and LangGraph is on the roadmap.
Yes. Audit exports include every log with its hash, signature, prev-hash, and the agent's public key. The verification algorithm is in lib/audit.ts (open source). Auditors can re-verify with a 40-line Node script.
The platform and agent source are available under a commercial license to customers. The audit verification library and policy template catalog are MIT.
OPA evaluation is typically sub-millisecond per tool call. The PreToolUse hook adds a single localhost HTTP round-trip. End to end, well under 50ms p99 for typical Rego.
Free to sign up. Demo project loads pre-populated with real denies and a real signed chain.