Declare what the agent can do
Write a mission profile in plain Markdown — which tools are allowed,
which files it can touch, what's off-limits. No YAML config hell, no
custom DSLs. Just a file called ARDUR.md that reads like
English.
Open-source AI governance — prove what your agents do
Ardur sits between your AI agent and the tools it uses. It enforces boundaries before actions happen, then gives you signed proof of every decision — so you can trust what your agents do, not just what they say.
Real-world test — Cloud model governed by Ardur
How it works
Ardur gives you three things that plain logs and chat transcripts can't.
Write a mission profile in plain Markdown — which tools are allowed,
which files it can touch, what's off-limits. No YAML config hell, no
custom DSLs. Just a file called ARDUR.md that reads like
English.
When your agent tries to step outside its mission, Ardur says no before the action executes. Not after. Not in a log you'll check next week. Right then, at runtime, with a clear reason why.
Every tool call produces a signed receipt, chained together with SHA-256 hashes. You can verify the entire session later — what was allowed, what was denied, and whether anyone tampered with the record.
Who is this for?
Use Claude Code, Codex, or any terminal agent? Ardur makes sure it stays in the right directory, doesn't delete things it shouldn't, and leaves a paper trail you can actually trust.
Need to prove to your security team, your customers, or your compliance auditor what your AI agents actually did? Ardur's receipt chains are designed for exactly that.
Running local models via Ollama? Experimenting with agent frameworks? Ardur plugs in without changing your stack — just point your agent at the proxy and get governance for free.
Proven with real models
We tested Ardur by asking a 1-trillion-parameter cloud model to build an entire web app — with every single tool call going through the governance proxy. Here's what happened.
All calls permitted, zero false denials
All calls permitted, local model too slow for sustained work
Works with your stack
Open source, MIT licensed, honest about limits
We publish the code, the tests, the specs, the audit trail, and the caveats — all in one repo. No marketing fluff, no "schedule a demo," no hidden enterprise tier.