AgenticDevelopment
Back to Showcase
Terminal window running sshcmd, sshcp and sshctl beside a hive-gatekeeper resource-limit panel with CPU, memory and timeout bars.
Software product

sshDCommander & hive-gatekeeper — safe remote access and hard limits for AI agents

Software product

Tech Stack

PythonAsyncIOParamikoPydanticMCPWindowsLinuxmacOS

About This Project

When we let AI agents operate on production servers, we needed guarantees that a runaway loop could not consume a machine — so we built the guardrails ourselves. sshDCommander is our SSH infrastructure daemon: it pools persistent sessions, keeps credentials inside the OS keyring, verifies every SFTP transfer with SHA-256, and exposes everything through short CLI tools (sshcmd, sshcp, sshctl) plus an MCP server that AI frameworks can plug into natively. hive-gatekeeper is the enforcement half. Every risky subprocess an agent spawns runs under hard OS-level CPU, memory and timeout caps, so a bad prompt or an infinite loop is bounded by the machine instead of the agent. Compliance stops being a retrospective audit and becomes a pre-emptive wall. Together they make it safe to hand real shell access to agents: production servers remain reachable, credentials never leak into logs, and the worst-case blast radius of any single command is known up front. This is the SSH-and-governance backbone of every other system on this page.

Related services

See how we approach projects like this.

Explore our services