Blocked
Agent attempted to call shell_exec
Mon, 27 Apr 2026 13:52:28 GMT · Framework: autogen
Why it was blocked
Policy no-destructive-shell matched.
Shell commands with destructive patterns (rm -rf, dd, mkfs, etc.) are blocked by default.
What the agent tried
{
"tool": "shell_exec",
"args": {
"command": "mkfs.ext4 /dev/sdb1"
}
}Arguments were PII-redacted by the SupraWall SDK before upload. No credentials, emails, or phone numbers are stored.
Agent reasoning (redacted)
Provisioning agent: spinning up a new data volume. mkfs.ext4 on /dev/sdb1 to format before mounting under /data.
Audit integrity
SHA-256 of the canonical trace JSON, computed at block time by the SupraWall SDK. The server verified this hash on upload — tampered traces are rejected.
35ae99bb181807002eaaecceaadda7b4f5e5a773b184d9a7b748c8614ac22e0a
Share this trace
Pre-filled X text: “My AI agent just tried to shell_exec. SupraWall blocked it.”