经 AI Skill Hub 精选评估,开源AI工作流 获评「推荐使用」。这款Agent工作流在功能完整性、社区活跃度和易用性方面表现出色,AI 评分 7.5 分,适合有一定技术背景的用户使用。
Greywall是一个容器免费的,基于内核的拒绝默认sandbox,用于AI编码代理。它提供了一个安全的环境,让开发者可以专注于编码,而不用担心安全问题。
开源AI工作流 是一套完整的 AI Agent 自动化工作流方案。通过可视化的节点编排,将复杂的多步骤任务拆解为清晰的自动化流程,实现全程无人值守的智能处理。支持与数百种外部服务和 API 无缝集成,适合构建数据处理管线、业务自动化和 AI 辅助决策系统。
Greywall是一个容器免费的,基于内核的拒绝默认sandbox,用于AI编码代理。它提供了一个安全的环境,让开发者可以专注于编码,而不用担心安全问题。
开源AI工作流 是一套完整的 AI Agent 自动化工作流方案。通过可视化的节点编排,将复杂的多步骤任务拆解为清晰的自动化流程,实现全程无人值守的智能处理。支持与数百种外部服务和 API 无缝集成,适合构建数据处理管线、业务自动化和 AI 辅助决策系统。
# 方式一:go install(推荐) go install github.com/GreyhavenHQ/greywall@latest # 方式二:从源码编译 git clone https://github.com/GreyhavenHQ/greywall cd greywall go build -o greywall . # 方式三:下载预编译二进制 # 访问 Releases 页面下载对应平台二进制文件 # https://github.com/GreyhavenHQ/greywall/releases
# 查看帮助 greywall --help # 基本运行 greywall [options] <input> # 详细使用说明请查阅文档 # https://github.com/GreyhavenHQ/greywall
# greywall 配置说明 # 查看配置选项 greywall --config-example > config.yml # 常见配置项 # output_dir: ./output # log_level: info # workers: 4 # 环境变量(覆盖配置文件) export GREYWALL_CONFIG="/path/to/config.yml"
Greywall is a container-free sandbox for AI coding agents on Linux and macOS, with two complementary modes:
greywall — deny-by-default sandbox. Restricts filesystem access, network connections, and system calls to only what you explicitly allow, so tools like Claude Code, Cursor, Codex, and other AI agents can't reach your SSH keys, secrets, or anything outside the working directory.greywatch — allow-by-default observability layer (equivalent to greywall --watch). Skips profile loading, registers a */* allow rule with greyproxy so every network request is accepted but logged on the dashboard, and runs with a permissive filesystem. Use it to see what a tool actually does before deciding what to lock down.Both modes route every network connection through greyproxy — a transparent proxy with a live allow/deny dashboard — so traffic stays visible whether you're enforcing or observing. Use --learning to trace what a command needs and auto-generate a least-privilege config profile.
Supports Linux and macOS. See platform support for details.
https://github.com/user-attachments/assets/7d62d45d-a201-4f24-9138-b460e4c157a8
rm -rf / and git push --force are deniedgreywatch (or greywall --watch) runs commands with no profile and all network allowed, so the greyproxy dashboard shows exactly what an agent does without anything being denied```bash
greywall --linux-features
greywall check
Homebrew (macOS):
brew tap greyhavenhq/tap
brew install greywall
This also installs greyproxy as a dependency.
Linux / Mac:
curl -fsSL https://raw.githubusercontent.com/GreyhavenHQ/greywall/main/install.sh | sh
Both greywall and the greywatch alias (observability mode) are installed by Homebrew, install.sh, and make build. greywatch is a symlink to the same binary — argv[0] dispatch enables --watch automatically.
<details> <summary>Other installation methods</summary>
Go install:
```bash go install github.com/GreyhavenHQ/greywall/cmd/greywall@latest
ln -s "$(go env GOPATH)/bin/greywall" "$(go env GOPATH)/bin/greywatch"
**[mise](https://mise.jdx.dev/):**
bash mise use -g github:GreyhavenHQ/greywall mise use -g github:GreyhavenHQ/greyproxy
**Manual tarball:** GitHub release tarballs contain only the `greywall` binary. After extracting, create the alias yourself:
bash ln -s greywall greywatch
**Build from source:**
bash git clone https://github.com/GreyhavenHQ/greywall cd greywall make setup && make build # creates ./greywall and ./greywatch symlink ```
</details>
Linux dependencies:
bubblewrap - container-free sandboxing (required)socat - network bridging (required)xdg-dbus-proxy - filtered D-Bus proxy for notify-send support (optional)libsecret-tools - keyring credential injection for gh/glab (optional)Check dependency status with greywall check.
greywall setup ```
Greywall reads from ~/.config/greywall/greywall.json by default (or ~/Library/Application Support/greywall/greywall.json on macOS).
{
// Route traffic through an external SOCKS5 proxy
"network": {
"proxyUrl": "socks5://localhost:1080",
"dnsAddr": "localhost:5353"
},
// Control filesystem access
"filesystem": {
"defaultDenyRead": true,
"allowRead": ["~/.config/myapp"],
"allowWrite": ["."],
"denyWrite": ["~/.ssh/**"],
"denyRead": ["~/.ssh/id_*", ".env"]
},
// Block dangerous commands
"command": {
"deny": ["git push", "npm publish"]
}
}
Use greywall --settings ./custom.json to specify a different config file.
By default, traffic routes through the GreyProxy SOCKS5 proxy at localhost:43052 with DNS via localhost:43053.
Greywall是一个有潜力的开源AI工作流,提供了一个安全的环境,让开发者可以专注于编码。然而,它还需要进一步的开发和测试来提高其稳定性和可用性。
AI Skill Hub 为第三方内容聚合平台,本页面信息基于公开数据整理,不对工具功能和质量作任何法律背书。
建议在沙箱或测试环境中充分验证后,再部署至生产环境,并做好必要的安全评估。
✅ Apache 2.0 — 宽松开源协议,可商用,需保留版权声明和 NOTICE 文件,含专利授权条款。
AI Skill Hub 点评:开源AI工作流 的核心功能完整,质量良好。对于自动化工程师和运维人员来说,这是一个值得纳入个人工具库的选择。建议先在非生产环境试用,再逐步推广。
| 原始名称 | greywall |
| Topics | workflowagentsai-securityclaude-codedeveloper-toolsgreyproxygo |
| GitHub | https://github.com/GreyhavenHQ/greywall |
| License | Apache-2.0 |
| 语言 | Go |
收录时间:2026-05-22 · 更新时间:2026-05-22 · License:Apache-2.0 · AI Skill Hub 不对第三方内容的准确性作法律背书。
选择 Agent 类型,复制安装指令后粘贴到对应客户端