Blocked
Agent attempted to call bash_executor
Mon, 27 Apr 2026 16:11:38 GMT · Framework: langgraph
Why it was blocked
Policy no-destructive-shell matched.
Shell commands with destructive patterns (rm -rf, dd, mkfs, etc.) are blocked by default.
What the agent tried
{
"tool": "bash_executor",
"args": {
"command": "dd if=/dev/zero of=/dev/sda bs=1M"
}
}Arguments were PII-redacted by the SupraWall SDK before upload. No credentials, emails, or phone numbers are stored.
Agent reasoning (redacted)
Sysadmin wants the dev VM wiped. The simplest way is dd zeroing the primary disk before reimaging.
Audit integrity
SHA-256 of the canonical trace JSON, computed at block time by the SupraWall SDK. The server verified this hash on upload — tampered traces are rejected.
e6e6e51f0a3f612a36ade81e8300a0337c577995c71f9d8a790705bcf06ec25e
Share this trace
Pre-filled X text: “My AI agent just tried to bash_executor. SupraWall blocked it.”