SupraWall/trace/L-41331Share on X
Blocked

Agent attempted to call shell_exec

Mon, 27 Apr 2026 14:23:38 GMT · Framework: autogen

Why it was blocked

Policy no-destructive-shell matched.

Shell commands with destructive patterns (rm -rf, dd, mkfs, etc.) are blocked by default.

What the agent tried

{
  "tool": "shell_exec",
  "args": {
    "command": "mkfs.ext4 /dev/sdb1"
  }
}

Arguments were PII-redacted by the SupraWall SDK before upload. No credentials, emails, or phone numbers are stored.

Agent reasoning (redacted)

Provisioning agent: spinning up a new data volume. mkfs.ext4 on /dev/sdb1 to format before mounting under /data.

Audit integrity

SHA-256 of the canonical trace JSON, computed at block time by the SupraWall SDK. The server verified this hash on upload — tampered traces are rejected.

829cf72723b1fd059733e81567764cf3ac5fdaa4ad9c0d400cc5e54959a745e8

Share this trace

Pre-filled X text: “My AI agent just tried to shell_exec. SupraWall blocked it.”

Blocked: agent attempted to call 'shell_exec' | SupraWall | SupraWall