ZLAR-FL ยท Open Source ยท Apache 2.0

ZLAR-FL

One view across all your governed agents.

Multi-agent fleet governance. Register agents, monitor health, aggregate audit trails, compare policies. Centralized visibility, distributed enforcement.

Get Started โ†’ Read the Legal

The Problem

Three machines. Three gates. Three audit trails.

Each ZLAR-governed agent runs its own gate and writes its own audit trail. That's correct โ€” enforcement is distributed. But visibility shouldn't be. When something goes wrong, you need one answer: is the fleet healthy? What did it do today? Are all agents running the same policy?

ZLAR-FL answers from a single CLI. Register your agents once. Query the fleet from anywhere.


Commands

Ten commands.

CommandWhat it does
initInitialize the fleet registry on this machine
registerAdd an agent to the fleet (name, framework, audit path, policy path)
deregisterRemove an agent from the fleet registry
listList all registered agents with status and framework
statusHealth check across the fleet โ€” gate running, audit reachable, policy valid
auditAggregate audit events from all agents โ€” filter by time, domain, action, agent
reportGenerate fleet-wide summary or per-agent reports
policyCompare policy versions and rule hashes across agents โ€” detect drift
topologyPrint fleet topology โ€” agents, frameworks, locations, policy status
updateUpdate agent metadata in the registry

Fleet Topology

See the whole fleet.

$ zlar-fl topology

ZLAR Fleet Topology
โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•

  dev-machine (localhost)
  โ”œโ”€โ”€ bohm [openclaw]        โ— running  policy: v1.1.0 โœ“
  โ”œโ”€โ”€ codex [claude-code]    โ— running  policy: v1.1.0 โœ“
  โ””โ”€โ”€ cursor-agent [cursor]  โ— running  policy: v1.1.0 โœ“

  build-server (192.168.1.42)
  โ”œโ”€โ”€ ci-agent [claude-code] โ— running  policy: v1.0.9 โš  drift
  โ””โ”€โ”€ deploy-agent [cursor]  โ—‹ stopped

Fleet: 5 registered  4 running  1 stopped  1 policy drift

Policy drift detection compares the SHA-256 hash of each agent's active policy. Agents with matching hashes have identical rule sets. Drift means one agent is running a different policy โ€” worth investigating.


Known Limitations

What ZLAR-FL doesn't do.

Local agents only for audit aggregation. Remote agents appear in topology but audit trail aggregation requires local file access. SSH-based remote audit is planned for v2.

No real-time monitoring. FL reads audit files at query time. It does not stream events or alert in real-time.

Policy sync is manual. FL detects drift but does not distribute policy updates. Deployment is a human action.

Agents don't know they're in a fleet. FL provides observability, not control. It reads agent data โ€” it does not modify agent behaviour.

Registry is not encrypted. The fleet registry contains file paths and hostnames. Do not store secrets or credentials in agent metadata.


The ZLAR Family

Seven products. One thesis.

ProductPlatformWhat it does
ZLAR-OCOpenClawOS-level containment โ€” user isolation, kernel sandbox, pf firewall, gate daemon, signed policy, audit trail
ZLAR-CCClaude CodeHook-based gate โ€” tool-call interception, risk classification, signed policy, Telegram approval
ZLAR GateClaude Code + Cursor + WindsurfUniversal gate โ€” one policy across multiple editors, framework-specific adapters
ZLAR-LTClaude Code + Cursor + WindsurfZero-config governance โ€” one command, instant protection, deny-heavy defaults
ZLAR-AUZLAR Gate audit trailCompliance reporting โ€” hash chain verification, framework mapping, Splunk export
ZLAR-NTCross-platformNetwork egress policy โ€” destination-aware, domain-level, gate-integrated
ZLAR-FLCross-platformFleet governance โ€” registry, health monitoring, audit aggregation, policy comparison

Built by Vincent Nijjar and ZLAR Inc.
Open source under Apache License 2.0. Free to use, modify, and distribute.