AI coding agents operate with permissions you never approved — silently reading credentials, API keys, and private data. ChainWall reveals what’s exposed and blocks threats before they happen.
Install globally, scan your project, and set up protection. Three commands, zero config.
Run chainwall with no arguments to launch the interactive TUI dashboard. Navigate with number keys 1-4, press ? for help.
Native support. Works out of the box with bash or zsh.
Full support on all major distros. Uses bash shell.
Requires WSL2. Native Windows is not supported.
Requires Node.js 18.17+ and a bash-compatible shell
macOS / Linux / WSL2 — native Windows is not supported
Every AI coding agent can read your AWS keys, SSH keys, .env files, crypto wallets, and browser cookies. A single prompt injection can exfiltrate them all.
Six steps from install to full protection. Click any step to see screenshots and usage details.
Install ChainWall globally with npm. It registers CLI commands, bash hooks, git hooks, MCP server, and instruction files for 11 AI platforms in one step.
Four core capabilities. Each reveals a different layer of your security posture. Click tabs to explore scan results, audit findings, runtime monitoring, and more.
Walk your filesystem with 241 detection patterns across 12 threat categories. Find credentials, private keys, PII, crypto wallets, and dangerous commands. Results grouped by category and severity.
241 detection patterns with mathematical validation — Luhn for credit cards, mod-97 for IBANs, Shannon entropy for tokens.
ChainWall detects and monitors every major AI coding tool. Each tool is classified by filesystem access level and protected with hooks, rules, and instruction files.
18 AI coding tools detected and monitored across 3 access tiers