Back to articles
Evidra – Fail closed kill-switch for AI agents running kubectl/terraform
NewsTools

Evidra – Fail closed kill-switch for AI agents running kubectl/terraform

via Dev.toVitaliy Ryumshyn

Hi guys, I recently asked an AI agent to delete an unused folder. It used a broad pattern match and removed more than I intended. Technically it did what I asked — but not what I meant. I clicked "yes" too quickly. Luckily I had a backup. That was just files. Now imagine the same semantic mismatch applied to kubectl delete or terraform apply. This got me thinking about pre-execution guardrails for AI agents working with infrastructure. So I built Evidra — an MCP server that evaluates operations against deterministic OPA policy before execution. If an operation looks dangerous (protected namespaces, mass deletions, public S3, wildcard IAM, etc.), it blocks it. There’s no LLM in the evaluation loop. GitHub: https://github.com/vitas/evidra I intentionally kept the policy scope narrow. This isn’t a full compliance engine — it focuses only on high-impact disaster scenarios. The goal is to keep it lightweight while preventing catastrophic mistakes, so teams can experiment with AI in ops more

Continue reading on Dev.to

Opens in a new tab

Read Full Article
7 views

Related Articles