[changelog]
New at Faramesh
Updates, changes, and improvements at Faramesh
Feb 22, 2026
OpenClaw Integration: Every Tool Call Now Governed
We intercepted OpenClaw and now control every one of its actions with Faramesh’s deterministic policy engine. All tool executions (bash, read, write, browser, canvas, etc.) are routed through a single non-bypassable chokepoint using the existing before_tool_call hook plus full HTTP invoke protection.
This is for teams running OpenClaw agents who want zero-trust governance, full audit visibility, and human-in-the-loop approvals without forking the codebase.
What's new:
Reliable interception via runBeforeToolCallHook in src/agents/pi-tools.before-tool-call.ts
Faramesh plugin registers before_tool_call and submits every call to POST /v1/actions
HTTP direct-invoke bypass closed in tools-invoke-http.ts
Every action appears in the dashboard (Allowed / Denied / Pending) with full provenance
Complete integration guide, E2E test suite, and retry behavior documented
Feb 19, 2026
Cryptographic Provenance Logging: Merkle Chain + Decision Provenance Records (DPR)
Every authorization decision is now permanently stored as a tamper-evident Decision Provenance Record (DPR) inside a cryptographically linked Merkle Chain. This is the exact provenance system described in our arXiv paper (2601.17744) — decision-centric, append-only, and mathematically verifiable.
You can now prove exactly why an action was allowed/denied (policy version, canonical action hash, state digest, outcome, and full chain linkage) without trusting execution logs or agent traces.
This is for compliance, security, forensics, and anyone who needs non-repudiable audit trails in regulated or high-stakes environments.
What's new:
Merkle Chain (hash-chained append-only log with Merkle Tree support) for tamper-evident provenance
Decision Provenance Records (DPR): canonical_action_hash, policy_version, state_hash, decision (PERMIT/DENY/DEFER), signature, seq, prev_hash
Public Merkle Root timestamping (for independent third-party verification)
Merkle Proof API (GET /v1/provenance/{hash}/proof) for efficient inclusion proofs
Deterministic replay endpoint (POST /v1/replay) — re-evaluate any historical decision under new policies or states
Full alignment with arXiv:2601.17744 guarantees (provenance-complete, replayable, decision-centric audit)
Feb 14, 2026
Policy System Overhaul: YAML Files → Database-Backed Governance
Policies have moved from disk-based YAML files to a fully versioned, database-backed store. On first startup Faramesh automatically imports any existing /policies/*.yaml files, then the engine reads exclusively from the policies table. The dashboard Governance tab and new Advanced tab give you one-click Allow/Ask/Deny plus a full JSON/YAML editor.
This is for teams that need scalable, auditable, compliance-grade policy management without redeployments or dual-system confusion.
What's new:
Automatic one-time migration from YAML files to DB on startup
Advanced policy editor with live JSON ↔ YAML toggle (powered by js-yaml)
New API endpoints: POST /v1/policies/import-yaml, full CRUD with versioning
Security hardening: 1 MB payload limit, regex complexity checks (<500 chars, no nested quantifiers), max 500 rules per policy
CLI commands: faramesh policy create, push, validate, diff, test
Removed all legacy YAML file endpoints and fallback logic
Feb 12, 2026
Credential Broker: Ephemeral Secrets from Vault, AWS, and Azure
lived credentials from your secret store (HashiCorp Vault, AWS Secrets Manager, or the newly added Azure Key Vault), injects them into the connector, and never stores them.
This is for security and DevOps teams that want agents to use real credentials safely without hard-coding or long-lived tokens.
What's new:
Full Azure Key Vault backend (azure-identity + azure-keyvault-secrets)
Comprehensive test suite covering all three backends and connector wiring
Clearer error messages when a secret is missing (includes exact secret path)
SPIFFE/Vault JWT auth documentation for workload identity
Updated architecture diagram and integration docs
Feb 11, 2026
Demo Suite: See Governance in Action
Ten demos show Faramesh in real scenarios: blocking `rm -rf` while allowing `ls`, requiring approval for discounts over 30%, preventing infinite agent loops, and detecting PII in logs. Each demo targets a specific risk, data loss, cost overruns, compliance, and shows how policies and approvals address it.
This is for evaluators and technical leads who want to see concrete outcomes before adopting.
What's new:
10 demos across LangChain, CrewAI, AutoGen, MCP
Float canonicalization (deterministic hashing)
Customer service discount control (prevent 100% discounts)
Healthcare PII redaction (SSN, credit cards)
DevOps security (allow
`ls`, block`rm -rf`and substitutes)Zero-trust cryptographic audit
Latency benchmark (sub-2ms overhead)
Run individual demos from the `demo_agents` folder or use the interactive menu. Start the Faramesh server first; demos connect and demonstrate each scenario in minutes.
Feb 8, 2026
CLI Overhaul: Full Terminal Control
The Faramesh CLI now gives you complete command-line access to every major feature—server management, actions, policies, agents, runtimes, and diagnostics.
This is for SREs, platform teams, and anyone who prefers scripting or lives in the terminal.
What's new:
Server commands faramesh serve, status, doctor, migrate
Action management faramesh list, get, approve, deny, tail
Policy commands faramesh policy show, set, list, create, validate, test, diff
Agent & runtime commands faramesh agents list, runtimes list
Full environment variable reference included in the new command-line reference.
Feb 8, 2026
Initial Release: Policy-Based Governance
The first release introduced the core model: every agent action passes through Faramesh, where a YAML policy engine decides allow, deny, or require approval. A SQLite-backed store, REST API, and web UI for approvals completed the loop. Python SDK and CLI made integration straightforward.
This laid the foundation for everything that followed, deterministic policy evaluation, audit trails, and human-in-the-loop workflows.
What's new:
Policy-based action governance (allow, deny, require_approval)
SQLite backend for actions
YAML-based policy engine
Basic REST API
Web UI for action approval
Python SDK and CLI tools
Configure policies in YAML or via API. Submit actions through the SDK or API; the engine evaluates, and the web UI handles approvals.
Feb 5, 2026
Command Palette and Keyboard Shortcuts
Power users can reach any page or action without the mouse. Press ⌘+K to open the command palette, search, and jump to Policies, Approvals, Usage, or Settings. Dedicated shortcuts (⌘+D, ⌘+P, ⌘+A, ⌘+U) take you straight to the main sections.
This is for anyone who wants to work faster and reduce repetitive clicks.
What's new:
Command palette (⌘+K) with 14 commands, navigation, actions, theme
Keyboard shortcuts: ⌘+D Dashboard, ⌘+P Policies, ⌘+A Approvals, ⌘+U Usage, ⌘+, Settings
Real-time search and keyboard navigation (↑↓, Enter, Esc)
Press ⌘+K from anywhere in the dashboard to open the palette. Type to filter; use arrow keys and Enter to run a command.
Feb 2, 2026
Client Dashboard: One Place for Governance
A single dashboard now covers policies, approvals, usage, agents, integrations, API keys, and audit. Filter by agent, tool, or status. See pending approvals at a glance. Export usage and audit data to JSON or CSV. Accessible, keyboard-friendly, and mobile-responsive.
This is for operators and admins who need to manage governance daily without jumping between tools.
What's new:
Dashboard with metrics (policies, approvals, usage) and activity feed
Policies CRUD with filters and status
Approvals workflow — approve, deny, view details
Usage analytics with time-series charts and export (JSON/CSV)
Agent monitoring UI with real-time status
Integrations management (GitHub, Slack, Jira, etc.)
API keys, generate, copy, revoke
Audit log with filters and CSV export
Settings for profile, org, billing, members
Navigate to each section from the sidebar. Use the command palette (⌘+K) and shortcuts (⌘+D for Dashboard, ⌘+P for Policies, ⌘+A for Approvals, ⌘+U for Usage, ⌘+, for Settings) for faster navigation.
Jan 27, 2026
Governance Just Got Human-in-the-Loop
Your AI agents can now get explicit approval before running high-risk actions. Instead of blocking everything or trusting blindly, you decide what needs a human check. When an agent tries to process a refund, run a shell command, or terminate AWS instances, Faramesh pauses and sends approval requests to Slack or email. Your team approves or denies with one click, no code required.
This is built for teams that want automation without losing control. Finance, DevOps, and customer support can safely delegate sensitive work to agents while keeping the final say.
What's new:
Slack and Email approval notifications — approve or deny from your existing tools
Approval callbacks with secure tokens — no extra auth for reviewers
Policy rules for
`require_approval`by tool, operation, and risk levelHuman-in-the-loop for payments, refunds, shell, and infrastructure changes
You define which actions need approval in your YAML policies. When an agent hits one, Faramesh sends the request; once approved, execution continues automatically.