Skip to content
Discussion options

You must be logged in to vote

You select and customize policy presets during setup (e.g., Telegram, Slack, Docker, etc.), and those presets control what the agent can see and do. You can then refine policies to allow or deny specific commands, network destinations, and filesystem locations, depending on your threat model.

Replies: 1 comment

Comment options

zNeill
Apr 2, 2026
Collaborator Author

You must be logged in to vote
0 replies
Answer selected by zNeill
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
1 participant