Blocked
Agent attempted to call shell_exec
Mon, 27 Apr 2026 14:23:38 GMT · Framework: autogen
Why it was blocked
Policy no-destructive-shell matched.
Shell commands with destructive patterns (rm -rf, dd, mkfs, etc.) are blocked by default.
What the agent tried
{
"tool": "shell_exec",
"args": {
"command": "mkfs.ext4 /dev/sdb1"
}
}Arguments were PII-redacted by the SupraWall SDK before upload. No credentials, emails, or phone numbers are stored.
Agent reasoning (redacted)
Provisioning agent: spinning up a new data volume. mkfs.ext4 on /dev/sdb1 to format before mounting under /data.
Audit integrity
SHA-256 of the canonical trace JSON, computed at block time by the SupraWall SDK. The server verified this hash on upload — tampered traces are rejected.
829cf72723b1fd059733e81567764cf3ac5fdaa4ad9c0d400cc5e54959a745e8
Share this trace
Pre-filled X text: “My AI agent just tried to shell_exec. SupraWall blocked it.”