Skip to main content

Policy Browser

77 policies. 366 rules. 2 packs.

vectimus-base-001
7 rules

Block recursive deletion of root, home or current directory

shell_command base
SOC2-CC6.1EU-AI-15

Click to expand

vectimus-base-002
4 rules

Block disk destruction via mkfs or dd zeroing

shell_command base
SOC2-CC6.1EU-AI-15

Click to expand

vectimus-base-003
1 rule

Block fork bomb execution

shell_command base
SOC2-CC6.1EU-AI-15

Click to expand

vectimus-base-004
4 rules

Block recursive chmod 777 on root filesystem

shell_command base
SOC2-CC6.1EU-AI-15

Click to expand

vectimus-base-005
4 rules

Block disk overwrite via redirect to block device

shell_command base
SOC2-CC6.1EU-AI-15

Click to expand

vectimus-base-006
27 rules

Block remote code execution via curl/wget piped to shell

shell_command base
SOC2-CC6.6SOC2-CC6.8NIST-AI-MG-3.2EU-AI-15

Click to expand

vectimus-base-007
1 rule

Block terraform destroy without explicit approval

infrastructure base
SOC2-CC6.1EU-AI-14

Click to expand

vectimus-base-008
1 rule

Block terraform apply with auto-approve flag

infrastructure base
SOC2-CC6.1EU-AI-14

Click to expand

vectimus-base-009
1 rule

Block kubectl delete namespace to prevent accidental cluster damage

infrastructure base
SOC2-CC6.1EU-AI-14

Click to expand

vectimus-base-010
1 rule

Block forced deletion of S3 buckets

infrastructure base
SOC2-CC6.1EU-AI-14

Click to expand

vectimus-base-011
2 rules

Block reading .env files that commonly contain secrets

file_read base
SOC2-CC6.1CIS-16EU-AI-15

Click to expand

vectimus-base-011-infra
1 rule

Block docker rm -f on running containers

infrastructure base
SOC2-CC6.1

Click to expand

vectimus-base-012
3 rules

Block reading SSH keys, AWS credentials and npmrc tokens

file_read base
SOC2-CC6.1EU-AI-15

Click to expand

vectimus-base-013
6 rules

Block reading files in secrets directories or credential/token config files

file_read base
SOC2-CC6.1EU-AI-15

Click to expand

vectimus-base-014
11 rules

Block shell commands that cat private keys

shell_command base
SOC2-CC6.1EU-AI-15

Click to expand

vectimus-base-015
1 rule

Block npm publish to prevent supply-chain attacks

package_operation base
SLSA-L2SOC2-CC6.8NIST-AI-MG-3.2EU-AI-15

Click to expand

vectimus-base-016
2 rules

Block pip install from non-standard indexes

package_operation base
SLSA-L2SOC2-CC6.8NIST-AI-MG-3.2EU-AI-15

Click to expand

vectimus-base-016b
1 rule

Block npm install with URL sources instead of registry packages

package_operation base
SLSA-L2SOC2-CC6.8EU-AI-15

Click to expand

vectimus-base-016c
1 rule

Block global npm installs which affect the system-wide environment

package_operation base
SOC2-CC6.8EU-AI-15

Click to expand

vectimus-base-017
6 rules

Block force push to main, master or production branches

git_operation base
SOC2-CC8.1

Click to expand

vectimus-base-018
1 rule

Block git reset --hard which discards uncommitted work

git_operation base
SOC2-CC8.1

Click to expand

vectimus-base-018b
1 rule

Block git clean -f which permanently deletes untracked files

git_operation base
SOC2-CC8.1

Click to expand

vectimus-base-019
1 rule

Block writes to GitHub Actions workflow files

file_write base
SLSA-L2SOC2-CC8.1

Click to expand

vectimus-base-020
3 rules

Block writes to certificate and private key files

file_write base
SOC2-CC6.1EU-AI-15

Click to expand

vectimus-base-020b
6 rules

Block writes to governance config files to prevent policy bypass

file_write base
SOC2-CC6.1EU-AI-14

Click to expand

vectimus-base-020c
2 rules

Block writes to Dockerfile and docker-compose in production contexts

file_write base
SOC2-CC8.1EU-AI-15

Click to expand

vectimus-base-020d
1 rule

Block writes to .git directory to prevent repository corruption

file_write base
SOC2-CC8.1

Click to expand

vectimus-base-021
6 rules

Block agents from running vectimus CLI commands to prevent governance bypass

shell_command base
SOC2-CC6.1EU-AI-14

Click to expand

vectimus-base-030
0 rules

Block MCP tool calls to servers not on the approved list

mcp_tool base
OWASP-ASI02SOC2-CC6.1NIST-AI-MG-3.2EU-AI-15

Click to expand

vectimus-base-031
4 rules

Block MCP tools that execute arbitrary shell commands on the server

mcp_tool base
OWASP-ASI02SOC2-CC6.1

Click to expand

vectimus-base-032
8 rules

Block MCP tool calls whose inputs reference credential or secret paths

mcp_tool base
OWASP-ASI02SOC2-CC6.1NIST-AI-MG-3.2EU-AI-15

Click to expand

vectimus-base-033
4 rules

Block MCP tool calls whose inputs reference private key files

mcp_tool base
OWASP-ASI02SOC2-CC6.1EU-AI-15

Click to expand

vectimus-base-034
4 rules

Block MCP tool calls whose inputs reference CI/CD pipeline files

mcp_tool base
OWASP-ASI02SLSA-L2SOC2-CC8.1

Click to expand

vectimus-base-035
19 rules

Block MCP tool calls whose inputs contain dangerous shell commands

mcp_tool base
OWASP-ASI02SLSA-L2SOC2-CC6.8

Click to expand

vectimus-base-036
3 rules

Block MCP tool calls whose inputs reference governance configuration files

mcp_tool base
OWASP-ASI02SOC2-CC6.1EU-AI-14

Click to expand

vectimus-base-040
2 rules

Block drizzle-kit operations with --force flag or drop command that bypass safety confirmation

shell_command base
SOC2-CC6.1EU-AI-14

Click to expand

vectimus-base-041
3 rules

Block prisma operations with --accept-data-loss or destructive reset/execute commands

shell_command base
SOC2-CC6.1EU-AI-14

Click to expand

vectimus-base-042
1 rule

Block knex migrate:rollback --all which destroys all migration state

shell_command base
SOC2-CC6.1EU-AI-14

Click to expand

vectimus-base-043
2 rules

Block sequelize database drop and full migration undo commands

shell_command base
SOC2-CC6.1EU-AI-14

Click to expand

vectimus-base-044
6 rules

Block Rails database drop, reset and schema:load commands

shell_command base
SOC2-CC6.1EU-AI-14

Click to expand

vectimus-base-045
2 rules

Block Django flush with --no-input flag that bypasses confirmation

shell_command base
SOC2-CC6.1EU-AI-14

Click to expand

vectimus-base-046
2 rules

Block TypeORM schema:drop and migration:revert commands

shell_command base
SOC2-CC6.1EU-AI-14

Click to expand

vectimus-base-047
1 rule

Block agents from spawning Claude Code with --dangerously-skip-permissions flag

shell_command base
SOC2-CC6.1EU-AI-14

Click to expand

vectimus-base-048
1 rule

Block agents from spawning Gemini CLI with --yolo flag that disables safety

shell_command base
SOC2-CC6.1EU-AI-14

Click to expand

vectimus-base-049
1 rule

Block agents from spawning AI tools with --trust-all-tools flag

shell_command base
SOC2-CC6.1EU-AI-14

Click to expand

vectimus-base-050
2 rules

Block agents from using generic permission bypass flags when spawning AI tools

shell_command base
SOC2-CC6.1EU-AI-14

Click to expand

vectimus-base-051
2 rules

Block writes to VS Code launch.json and extensions.json that control debugging and extensions

file_write base
SOC2-CC6.1EU-AI-14

Click to expand

vectimus-base-052
2 rules

Block writes to MCP configuration files that control tool access

file_write base
SOC2-CC6.1EU-AI-14

Click to expand

owasp-001
ASI01 8 rules

Block base64-encoded data exfiltration via curl or wget

shell_command owasp-agentic
OWASP-ASI01SOC2-CC6.6EU-AI-15

Click to expand

owasp-002
ASI01 6 rules

Block DNS exfiltration via nslookup or dig with piped input

shell_command owasp-agentic
OWASP-ASI01SOC2-CC6.6EU-AI-15

Click to expand

owasp-003
ASI01 12 rules

Block piping credential or system files to network transfer tools

shell_command owasp-agentic
OWASP-ASI01SOC2-CC6.6EU-AI-15

Click to expand

owasp-004
ASI02 4 rules

Block agent writes to system configuration directories

file_write owasp-agentic
OWASP-ASI02SOC2-CC6.1EU-AI-15

Click to expand

owasp-005
ASI02 16 rules

Block execution of scripts written to /tmp by agents

shell_command owasp-agentic
OWASP-ASI02SOC2-CC6.8EU-AI-15

Click to expand

owasp-006
ASI02 7 rules

Block database destruction commands in shell

shell_command owasp-agentic
OWASP-ASI02SOC2-CC6.1EU-AI-14

Click to expand

owasp-007
ASI03 4 rules

Block cloud CLI privilege escalation commands

infrastructure owasp-agentic
OWASP-ASI03SOC2-CC6.1EU-AI-15

Click to expand

owasp-008
ASI03 5 rules

Block file operations targeting other users' home directories

file_read owasp-agentic
OWASP-ASI03SOC2-CC6.1

Click to expand

owasp-009
ASI03 8 rules

Block sudo and su execution by agents to prevent privilege escalation

shell_command owasp-agentic
OWASP-ASI03SOC2-CC6.1EU-AI-14

Click to expand

owasp-010
ASI04 9 rules

Block agent modification of package lockfiles

file_write owasp-agentic
OWASP-ASI04SOC2-CC8.1NIST-AI-MG-3.2EU-AI-15

Click to expand

owasp-011
ASI04 5 rules

Block modification of package registry configuration files

file_write owasp-agentic
OWASP-ASI04SOC2-CC8.1NIST-AI-MG-3.2EU-AI-15

Click to expand

owasp-012
ASI04 1 rule

Block cargo install from git URLs which bypass registry review

package_operation owasp-agentic
OWASP-ASI04SOC2-CC6.8NIST-AI-MG-3.2EU-AI-15

Click to expand

owasp-013
ASI04 1 rule

Block adding git submodules which can introduce unvetted code

git_operation owasp-agentic
OWASP-ASI04SOC2-CC8.1NIST-AI-MG-3.2

Click to expand

owasp-014
ASI05 20 rules

Block reverse shell patterns in shell commands

shell_command owasp-agentic
OWASP-ASI05SOC2-CC6.8EU-AI-15

Click to expand

owasp-015
ASI05 6 rules

Block python -c with network or socket operations

shell_command owasp-agentic
OWASP-ASI05SOC2-CC6.8EU-AI-15

Click to expand

owasp-016
ASI05 12 rules

Block downloading and executing binaries in a single command chain

shell_command owasp-agentic
OWASP-ASI05SOC2-CC6.8EU-AI-15

Click to expand

owasp-017
ASI05 11 rules

Block eval and exec patterns in shell commands that execute dynamic code

shell_command owasp-agentic
OWASP-ASI05SOC2-CC6.8EU-AI-15

Click to expand

owasp-018
ASI06 10 rules

Block writes to agent instruction and rules files

file_write owasp-agentic
OWASP-ASI06SOC2-CC6.1EU-AI-14

Click to expand

owasp-019
ASI06 4 rules

Block writes to agent memory and state directories

file_write owasp-agentic
OWASP-ASI06SOC2-CC6.1EU-AI-14

Click to expand

owasp-020
ASI10 20 rules

Block agents from disabling or clearing log and audit files

shell_command owasp-agentic
OWASP-ASI10SOC2-CC7.2EU-AI-15

Click to expand

owasp-021
ASI10 13 rules

Block creation of cron jobs and scheduled tasks by agents

shell_command owasp-agentic
OWASP-ASI10SOC2-CC7.2EU-AI-15

Click to expand

owasp-022
ASI07 1 rule

Block broadcast messages to all agents to prevent amplification and noise injection

agent_message owasp-agentic
OWASP-ASI07SOC2-CC7.2EU-AI-14

Click to expand

owasp-023
ASI07 2 rules

Block spawning sub-agents with elevated permissions that bypass safety controls

agent_spawn owasp-agentic
OWASP-ASI07SOC2-CC7.2EU-AI-14

Click to expand

owasp-024
ASI07 1 rule

Block agents from sending shutdown requests to terminate peer agents

agent_message owasp-agentic
OWASP-ASI07SOC2-CC7.2EU-AI-14

Click to expand

owasp-025
ASI08 1 rule

Block agent spawning with excessive turn counts that risk runaway execution

agent_spawn owasp-agentic
OWASP-ASI08SOC2-CC7.2EU-AI-14

Click to expand

owasp-026
ASI08 0 rules

Block creation of multi-agent teams to prevent uncontrolled swarm amplification

agent_spawn owasp-agentic
OWASP-ASI08SOC2-CC7.2EU-AI-14

Click to expand

owasp-027
ASI08 2 rules

Block spawning background agents with unrestricted permissions to prevent unmonitored cascades

agent_spawn owasp-agentic
OWASP-ASI08SOC2-CC7.2EU-AI-14

Click to expand

owasp-028
ASI08 1 rule

Block agent spawning when session-level spawn flood is detected

agent_spawn owasp-agentic
OWASP-ASI08SOC2-CC7.2EU-AI-14

Click to expand

owasp-029
ASI08 1 rule

Block agent messaging when session-level message flood is detected

agent_message owasp-agentic
OWASP-ASI08SOC2-CC7.2EU-AI-14

Click to expand