Welcome to TameFlare
A transparent proxy firewall for AI agents. Intercept all outbound HTTP traffic, enforce per-agent permissions, require human approval for risky actions, and keep an audit trail of everything your agents do. Zero code changes required.
What is TameFlare?
AI agents are increasingly autonomous. They can create pull requests, send emails, transfer money, and provision infrastructure - all without a human in the loop. That's powerful, but it's also risky.
TameFlare sits between your agents and the tools they use. Every action an agent wants to take is sent to TameFlare first. TameFlare evaluates the action against your policies and returns one of three decisions:
allowThe action is safe. TameFlare issues a signed token and the agent proceeds.
requires_approvalThe action is risky. TameFlare notifies a human via Slack. The agent waits until someone approves or rejects.
denyThe action is blocked. The agent receives a clear reason and cannot proceed.
Policies are configured in the dashboard via a 4-step builder and stored as JSON. They can match on action type, target environment, parameters, risk level, time of day, and more. TameFlare uses a deny-wins model: if any policy says deny, the action is denied regardless of other policies.
How it works
# 1. Sign up at tameflare.com/register # 2. Create a gateway in the dashboard (Gateways → Create gateway) # 3. Run your agent through the proxy tf run -- python my_agent.py # All outbound HTTP is now proxied: # domain → connector → parse action → check permission # allowed: inject credentials → forward # denied: return 403 # require_approval: hold connection → wait for human
The cloud gateway at proxy.tameflare.com is a transparent HTTP/HTTPS proxy. The CLI sets HTTPS_PROXY and spawns your process. All outbound traffic is routed through the gateway, which parses requests via connectors (GitHub, OpenAI, Anthropic, Stripe, Slack, MCP, Webhook, or any HTTP API), checks per-gateway permissions, and injects credentials from an encrypted vault. The agent never sees real API keys.
The dashboard at tameflare.com is the control plane. Configure gateways, manage connectors and permissions, view traffic logs, and approve requests. The gateway fetches its config from the dashboard on startup and polls for updates every 60 seconds.
What can you control?
TameFlare's policy engine is generic. It evaluates fields like action_spec.type and parameters.* against conditions you define. This means you can write policies for any domain:
Source control
Merge PRs, delete branches, create releases
Payments
Wire transfers, refunds, subscription changes
Infrastructure
Provision servers, modify DNS, scale clusters
Communications
Send emails, post to Slack, publish announcements
Access management
Create users, change permissions, rotate secrets
Agent orchestration
Spawn sub-agents, delegate tasks, share context
See the Writing Policies page for real-world examples across all these domains.
Key capabilities
8 built-in connectors
GitHub (20+ actions), OpenAI (24+), Anthropic, Stripe (40+), Slack (35+), MCP (JSON-RPC tool calls), Webhook, and Generic HTTP. Each connector parses raw HTTP requests into structured actions with risk levels.
Credential vault
API keys stored in AES-256-GCM encrypted vault. Injected by the proxy at request time. Agent never sees real credentials. Compromised agent cannot extract keys.
Human-in-the-loop
Proxy holds HTTP connection open until a human approves via the dashboard (5 min timeout). Also supports Slack notifications. RBAC enforces role hierarchy: owner, admin, member, viewer.
Live traffic log
Every proxied request logged with agent, domain, action type, decision, latency, and status code. Searchable, filterable, and exportable from the dashboard.
Scoped kill switch
Block all traffic instantly, or scope to a specific connector or agent. Activate via the dashboard. Restricted to org owners via RBAC.
Dashboard wizard
Create gateways in the dashboard with a step-by-step wizard. Select connectors, set access rules per action category, configure notifications, and get a ready-to-use tf init command.
Choose your path
Different roles need different information. Pick the path that matches your goal:
Developer POC
Install, run, see traffic, ship.
Security Review
Threat model, data handling, compliance.
Platform / Ops
Rollout, monitoring, runbooks.
Documentation
Quick Start
Install, configure, and proxy your first agent in 5 minutes.
Concepts & Terminology
Connectors, permissions, deny-all model, approval workflow, kill switch, and credential vault.
Integration Guide
Connect any agent to TameFlare with zero code changes. Works with Python, Node.js, Go, LangChain, CrewAI, and more.
Writing Policies
Policy builder, scopes, nested conditions, and real-world examples for GitHub, payments, infrastructure, and more.
Connectors
8 built-in connectors: GitHub, OpenAI, Anthropic, Stripe, Slack, MCP, Webhook, and Generic HTTP.
Security
Cloud proxy architecture, credential vault, data handling, and operational security.
System Architecture
How the CLI, cloud gateway, and dashboard work together. Cloud proxy deployment model.
Changelog
Release notes and version history.
TameFlare is source-available under the Elastic License v2 (ELv2). Full source code auditable. Cannot be offered as a managed service by third parties.