Khoregos is the governance layer for Claude Code Agent Teams. Audit trails. Enforced boundaries. Compliance tooling. Uses Claude Code's public hooks and MCP — zero patching, zero changes to how your agents work.
Native Agent Teams handles coordination. Not this.
Governance Layer
Dual-audit architecture: cooperative MCP tools for agents that comply, non-cooperative hooks as a safety net for everything else.
A governed session wraps your Agent Team invocation. Start one on Monday, keep working through Friday — every action captured in a single audit trail. SQLite-backed, survives restarts. k6s export --format git commits governance state to your repo. k6s team resume picks up where you left off.
HMAC-SHA256 hash chain across 26 event types. Every agent action: who, what, why, when. RFC 3161 external timestamping. JSON/CSV export for SIEM ingestion. k6s audit verify --exit-code in CI.
Configurable gate rules match file patterns (.env*, *.pem, package.json) and flag sensitive changes for human review. Gate events surface in k6s audit show --type gate_triggered and fire webhooks to Slack, PagerDuty, or your approval system.
allowed_paths / forbidden_paths per agent via picomatch globs. Advisory mode logs violations; strict mode triggers git-backed revert. Path traversal and symlink exfiltration hardening built in.
Per-agent resource limits (max_tool_calls_per_session) cap runaway agents. Session attribution tracks which agent did what. Tool duration metrics feed Prometheus.
OpenTelemetry traces and metrics with OTLP export. Prometheus endpoint at :9090/metrics. HMAC-signed webhook dispatcher with event filtering and retry backoff. Ships to Grafana, Jaeger, LangFuse, Datadog.
Four Claude Code hooks (PostToolUse, SubagentStart, SubagentStop, Stop), MCP server with 8 governance tools, SKILL injection for agent context, and slash commands (/k6s start, /k6s status, /k6s audit, /k6s stop).
SOC 2 and ISO 27001 report templates included. Six configuration presets: minimal, security-strict, compliance-soc2, compliance-iso27001, monorepo, microservices.
| Domain | Khoregos capability |
|---|---|
| Change management | k6s audit report --standard soc2|iso27001 · strict boundary enforcement · plugin hooks · CI/CD gating via --exit-code |
| Supply chain security | Automatic dependency diff detection on package.json · k6s export --format git for PR review |
| Audit integrity | HMAC-SHA256 hash chain · RFC 3161 timestamping · k6s audit verify --from-export in CI |
| Data classification | Four-level file tags: public / internal / confidential / restricted · severity auto-classification |
| Access control | Per-agent boundaries · allowed_paths / forbidden_paths · max_tool_calls_per_session · exclusive file locks |
| Compliance reporting | k6s compliance checkpoint --json --exit-code · attestation records · JSON/CSV export for SIEM |
| Data retention | Configurable retention per dimension: audit_retention_days, session_retention_days, context_retention_days |