Runtime governance layer for AI agents. See every tool call. Enforce policies. Prove compliance.
Imara sits between your AI agent and the tools it uses, providing tamper-proof audit trails, policy enforcement, and a real-time dashboard — with zero config changes to your agent.
One command. That's it.
npx imaraThis will:
- Auto-detect and wrap your MCP servers
- Load a demo session so you can explore immediately
- Open the dashboard at
http://localhost:3838
Imara wraps your existing MCP servers. Your agent doesn't know it's there. Every tool call flows through Imara, gets logged, and is evaluated against your policies.
Every event is SHA-256 hash-chained. If anyone tampers with the log, the chain breaks. Run imara verify to check integrity at any time.
Define rules in YAML. Block destructive operations, rate-limit writes, flag high-risk actions. Ships with sensible defaults out of the box.
- name: block-force-push-to-main
priority: 10
match:
tools:
- tool: git_push
- tool: git_force_push
arguments:
- field: branch
operator: in
value: [main, master, production]
action: deny
reason: Force push to protected branches is not allowedVisual timeline of every agent action with policy decision badges, latency metrics, and session grouping. The risk summary tells you at a glance what your agents have been doing.
imara wrap reads your existing .mcp.json or Claude Desktop config, wraps every server entry to route through the proxy, and saves a backup. imara unwrap restores the original. No manual config editing.
| Command | Description |
|---|---|
imara |
Full setup: init + wrap + dashboard |
imara init |
Initialize ~/.imara/ config and database |
imara wrap |
Auto-patch MCP config to route through proxy |
imara unwrap |
Restore original MCP config from backup |
imara tail |
Live stream audit events in terminal |
imara tail -f |
Follow mode — watch events as they happen |
imara dashboard |
Open the web dashboard |
imara verify |
Verify hash chain integrity |
imara status |
Show monitoring stats |
Your Agent Imara Proxy Real MCP Server
│ │ │
│── tools/call ────→ │ │
│ │── evaluate policy │
│ │── log audit event │
│ │── tools/call ─────────→ │
│ │ │
│ │ ←──── result ────────── │
│ │── log result + hash │
│ ←──── result ───── │ │
Use the CLI directly:
npx imaraOr install individual packages for programmatic use:
npm install @imara/core # Types, schemas, hash chain
npm install @imara/policy # Policy engine
npm install @imara/store # Audit storage (SQLite)
npm install @imara/proxy # MCP proxyMonorepo with clean package boundaries:
- @imara/core — Types, Zod schemas, SHA-256 hash chaining
- @imara/store — Audit event storage (SQLite for local, Postgres planned)
- @imara/policy — TypeScript-native policy evaluation engine
- @imara/proxy — MCP proxy with tool call interception
- @imara/dashboard — Next.js web UI with timeline view
AI agents are doing real work — reading files, executing code, calling APIs, pushing to git. But most teams have zero visibility into what their agents actually do.
Existing tools don't solve this:
- Observability platforms (LangSmith, Langfuse) show traces but don't enforce policies
- Security tools (Zenity, Lakera) focus on prompt injection, not runtime governance
- Nothing provides compliance-grade audit trails for agent actions
Imara fills the gap: runtime governance with cryptographic proof.
Imara's audit trail maps to major compliance frameworks:
- EU AI Act Art. 12 (record-keeping) & Art. 14 (human oversight)
- SOC 2 CC6.1, CC8.1 (change management)
- HIPAA audit controls
- ISO 42001 AI management systems
- MCP proxy with transparent interception
- SHA-256 hash-chained audit trail
- YAML policy engine with glob matching
- Real-time dashboard with timeline view
- Zero-config
imara wrapsetup - Postgres store for team deployments
- Team mode with multi-user access
- Compliance report exports (EU AI Act, SOC 2)
- Human-in-the-loop escalation workflows
- SSE/WebSocket transport support
- Docker Compose for server deployment
git clone https://github.com/dnakitare/imara.git
cd imara
pnpm install
pnpm build
node packages/cli/dist/cli.jsSee CONTRIBUTING.md.
Apache 2.0 — see LICENSE.