egress_guard

Outbound network control by domain/IP policy.


What it mitigates


Profilestrategy
localstrict allowlist
standardallowlist for critical paths, blocklist for known bad
unboundedmonitor and log aggressively

Minimal config

moduleConfig:
  egress_guard:
    bindingMode: global_only   # global_only | intersect
    # Choose one mode for predictability:
    # allowedDomains:
    #   - "api.openai.com"
    #   - "example.org"
    # blockedDomains:
    #   - "*.pastebin.com"

Tool-specific binding example (bindingMode: intersect):

moduleConfig:
  tool_policy:
    rules:
      - tool: "SlackSend"
        action: allow
        egress:
          allowedDomains: ["api.slack.com"]
  egress_guard:
    allowedDomains: ["api.slack.com", "api.openai.com"]
    bindingMode: intersect

Design guidance