In the live dashboard, these controls appear in the
Platform tab when the
matching feature flags are enabled. Viewer tokens can inspect safe read-only
sections, but owner or admin credentials are required for approval and
redaction management.Tool Inventory
On successfultools/list responses, ThornGuard can persist a catalog of upstream tools per license and upstream origin.
Stored data includes:
- tool name
- optional title
- annotation metadata
- input and output schema hashes
- upstream target
- computed risk level
- first-seen and last-seen timestamps
destructiveHintpushes a tool towardhighreadOnlyHintpushes a tool towardlow- names like
delete,exec,shell,deploy, orpublishraise risk
Approval Workflows
Approval profiles let a tenant require explicit approval before ThornGuard will forward certaintools/call requests.
Approvals can be triggered by:
- matched policy context
- high-risk tools
- medium-risk tools when configured
approval_requests record and returns a structured error payload containing an approval URL.
If the client advertised URL-mode elicitation capability during initialize, ThornGuard can include a URL-mode approval hint in the response.
Approval API
GET /api/approval-profilesPOST /api/approval-profilesPATCH /api/approval-profiles/:idDELETE /api/approval-profiles/:idGET /api/approval-requestsPOST /api/approval-requests/:id/approvePOST /api/approval-requests/:id/deny
Custom Redaction Rules
Built-in PII and secret detection is always on. Enterprise tenants can add custom regex rules on top. Each custom rule has:- a
mode:auditorredact - a regex
pattern - an optional
replacement - an enabled flag
redaction_rules table and applied after ThornGuard’s built-in redaction engine.
Redaction API
GET /api/redaction-rulesPOST /api/redaction-rulesPATCH /api/redaction-rules/:idDELETE /api/redaction-rules/:id