SupraWall/trace/E-64316Share on X
Blocked

Agent attempted to call shell_exec

Mon, 27 Apr 2026 13:52:28 GMT · Framework: autogen

Why it was blocked

Policy no-destructive-shell matched.

Shell commands with destructive patterns (rm -rf, dd, mkfs, etc.) are blocked by default.

What the agent tried

{
  "tool": "shell_exec",
  "args": {
    "command": "mkfs.ext4 /dev/sdb1"
  }
}

Arguments were PII-redacted by the SupraWall SDK before upload. No credentials, emails, or phone numbers are stored.

Agent reasoning (redacted)

Provisioning agent: spinning up a new data volume. mkfs.ext4 on /dev/sdb1 to format before mounting under /data.

Audit integrity

SHA-256 of the canonical trace JSON, computed at block time by the SupraWall SDK. The server verified this hash on upload — tampered traces are rejected.

35ae99bb181807002eaaecceaadda7b4f5e5a773b184d9a7b748c8614ac22e0a

Share this trace

Pre-filled X text: “My AI agent just tried to shell_exec. SupraWall blocked it.”

Blocked: agent attempted to call 'shell_exec' | SupraWall | SupraWall