Developer Platform

Build governed agents without changing your stack

Start local with the open SDK, enforce policy checks at runtime, and connect to managed fleet governance as your deployment scales.

Quick Start

01

Install

Add the SDK to your agent runtime.

npm install @sekuire/sdk
02

Scaffold

Generate sekuire.yml and project scaffolding.

sekuire init --name my-agent --language typescript
03

Enforce

Run runtime policy checks before sensitive actions.

const allowed = await sdk.checkPolicy(action, context)
TypeScript reference
import { SekuireSDK } from "@sekuire/sdk"

const sdk = SekuireSDK.fromEnv()
await sdk.start()

const allowed = await sdk.checkPolicy("tool.http.request", {
  url: "https://example.com"
})

if (!allowed) throw new Error("Blocked by policy")
TypeScriptPythonRust
Policy-as-code
rules:
  - action: tool.http.request
    effect: deny
    when:
      url_match: "*.corp.example.com*"

Define behavior constraints once. Enforce consistently across local and managed agent runtimes.

sekuire.yml
# Agent governance policy
version: "2.0"
rules:
- name: "block-external-data"
match: "action.type == 'http_request'"
condition: "!destination.is_internal"
effect: deny
- name: "require-approval-pii"
match: "data.contains_pii == true"
effect: require_approval
DENIED
agent/shadow-crawler attempted external HTTP request
>
Agent Boots
SDK initializes
~
Beacon Fires
Phones home
#
Registry Validates
Identity check
+
Dashboard: Online
Visible to admins
Open SDK
  • Policy-as-code with "sekuire.yml"
  • Runtime enforcement (offline-first)
  • Identity hashing and signatures
  • Local audit sinks (console/file)
  • Works with any framework or model
Sekuire Cloud
  • Fleet dashboard and inventory
  • Centralized policy distribution
  • Registry publishing and verification
  • Immutable audit retention
  • SSO and RBAC (Enterprise)
A2AMCPCustom APIsLangChainCrewAI