Zero-config governance for AI coding agents.
One command. Auto-detects Claude Code, Cursor, and Windsurf. Generates Ed25519 keys. Signs a deny-heavy policy. Configures hooks. Governance running in under 60 seconds.
curl -fsSL https://zlar.ai/install.sh | bash
ZLAR-LT ships with 23 rules (8 allow, 15 deny). The agent can read, write, edit, and search. It cannot delete, escalate, persist, exfiltrate, or push. Anything not explicitly allowed is denied.
cat, head, tail, less)ls, find, tree)grep, rg, ag)mkdir)pwd, whoami, date)rm, rmdir)curl, wget, nc)npm install, pip install, brew install)sudo, su)No Telegram. No decisions. Safe actions flow through instantly. Blocked actions are denied with a reason. The agent knows why. The audit trail records everything.
Three rules exist specifically to prevent the agent from modifying or reading its own governance infrastructure:
The policy is signed with Ed25519. The gate verifies the signature on every load. An agent that writes to the policy file invalidates the signature โ the gate detects this and denies everything. Governance that the governed party can modify is not governance.
curl -fsSL https://zlar.ai/install.sh | bash
The installer:
No configuration required. No Telegram bot. No API tokens. No decisions. You can read and customize the default policy at ~/.zlar-lt/policies/lt-default.policy.json.
If you want to read the install script before running it: github.com/ZLAR-AI/ZLAR-LT/blob/main/install.sh
ZLAR-LT is the on-ramp. It gives you immediate protection with zero configuration. When you're ready for more control, there's a clear path up.
No Telegram approval. Blocked actions are denied, not held for review. If you want case-by-case approval, add a Telegram token or upgrade to ZLAR Gate.
Cursor file edits are audited, not pre-blocked. Cursor's afterFileEdit hook fires after the edit is applied. File edits are recorded but cannot be stopped in advance.
Obfuscated commands may bypass regex rules. Base64, eval wrappers, and variable indirection can evade string-level rules. This is a fundamental limitation of regex-based classifiers.
Cursor and Windsurf adapters are built from documentation, not tested against live payloads. The Claude Code adapter is verified. If you use ZLAR-LT with Cursor or Windsurf and encounter issues, open an issue.
ZLAR-LT reduces risk. It does not eliminate it. See Legal for complete terms.
Same principle: independent governance that does not depend on the model's cooperation. Different surfaces.
| Product | Platform | What it does |
|---|---|---|
| ZLAR-OC | macOS (OpenClaw) | OS-level containment โ user isolation, kernel sandbox, firewall, signed policy, audit trail |
| ZLAR-CC | Claude Code | Hook-based gate โ tool-call interception, risk classification, signed policy, Telegram approval |
| ZLAR Gate | Claude Code + Cursor + Windsurf | Universal policy enforcement โ one gate, three frameworks |
| ZLAR-LT | Claude Code + Cursor + Windsurf | Zero-config governance โ one command install, deny-heavy defaults |
| ZLAR-AU | ZLAR Gate audit trail | Compliance reporting โ PCI-DSS, SOC 2, OSFI B-13, SOX, EU AI Act |
| ZLAR-NT | Cross-platform | Network egress policy โ domain-aware, gate-integrated |
| ZLAR-FL | Cross-platform | Fleet governance โ registry, health monitoring, audit aggregation |
Built by Vincent Nijjar and ZLAR Inc.
Open source under Apache License 2.0. Free to use, modify, and distribute.