Files
sure/pipelock.example.yaml
Juan José Mata ea49c988b9 Update Docker Compose file for AI optional features (#1349)
* Guard docs workflow to upstream repo

Agent-Logs-Url: https://github.com/jjmata/sure/sessions/230a651a-b564-49fa-9563-4986fc5f2c13

Co-authored-by: jjmata <187772+jjmata@users.noreply.github.com>

* Limit docs workflow token permissions

Agent-Logs-Url: https://github.com/jjmata/sure/sessions/230a651a-b564-49fa-9563-4986fc5f2c13

Co-authored-by: jjmata <187772+jjmata@users.noreply.github.com>

* Add OpenClaw service to AI compose example

* Adjust OpenClaw compose and Pipelock defaults

* Keep OpenClaw gateway running when unconfigured

* Include Ollama in external-assistant profile

* Tidy up language/simplify names

* Make `profile` name more explicit (local-ai)

* Clarify `local-ai` is included in OpenClaw profile

* Correct internal roting for OpenClaw

---------

Co-authored-by: copilot-swe-agent[bot] <198982749+Copilot@users.noreply.github.com>
Co-authored-by: jjmata <187772+jjmata@users.noreply.github.com>
2026-04-02 20:05:16 +02:00

73 lines
1.8 KiB
YAML

# Pipelock configuration for Docker Compose
# See https://github.com/luckyPipewrench/pipelock for full options.
#
# New in v2.0: trusted_domains, redirect profiles, attack simulation,
# security scoring, process sandbox, and enhanced tool poisoning detection.
# Run `pipelock simulate --config <file>` to test your config against 24 attack scenarios.
# Run `pipelock audit score --config <file>` for a security posture score (0-100).
version: 1
mode: balanced
# Trusted domains: allow services whose public DNS resolves to private IPs.
# Prevents SSRF scanner from blocking legitimate internal traffic.
# trusted_domains:
# - "api.internal.example.com"
# - "*.corp.example.com"
forward_proxy:
enabled: true
max_tunnel_seconds: 300
idle_timeout_seconds: 60
websocket_proxy:
enabled: false
max_message_bytes: 1048576
max_concurrent_connections: 128
scan_text_frames: true
allow_binary_frames: false
forward_cookies: false
strip_compression: true
max_connection_seconds: 3600
idle_timeout_seconds: 300
origin_policy: rewrite
dlp:
scan_env: true
include_defaults: true
response_scanning:
enabled: true
action: warn
include_defaults: true
mcp_input_scanning:
enabled: true
action: block
on_parse_error: block
mcp_tool_scanning:
enabled: true
action: warn
detect_drift: true
mcp_tool_policy:
enabled: false
action: warn
# Redirect profiles (v2.0): route matched tool calls to audited handler programs
# instead of blocking. The handler returns a synthetic MCP response.
# redirect_profiles:
# safe-fetch:
# exec: ["/pipelock", "internal-redirect", "fetch-proxy"]
# reason: "Route fetch calls through audited proxy"
mcp_session_binding:
enabled: true
unknown_tool_action: warn
tool_chain_detection:
enabled: true
action: warn
window_size: 20
max_gap: 3