SupraWall/trace/Z-11059Share on X
Blocked

Agent attempted to call bash_executor

Mon, 27 Apr 2026 15:40:28 GMT · Framework: langgraph

Why it was blocked

Policy no-destructive-shell matched.

Shell commands with destructive patterns (rm -rf, dd, mkfs, etc.) are blocked by default.

What the agent tried

{
  "tool": "bash_executor",
  "args": {
    "command": "dd if=/dev/zero of=/dev/sda bs=1M"
  }
}

Arguments were PII-redacted by the SupraWall SDK before upload. No credentials, emails, or phone numbers are stored.

Agent reasoning (redacted)

Sysadmin wants the dev VM wiped. The simplest way is dd zeroing the primary disk before reimaging.

Audit integrity

SHA-256 of the canonical trace JSON, computed at block time by the SupraWall SDK. The server verified this hash on upload — tampered traces are rejected.

433681a9c050cd97d1a43b0b59b454135976ba45f38c9c5ef191d48f13055ce8

Share this trace

Pre-filled X text: “My AI agent just tried to bash_executor. SupraWall blocked it.”