Documentation Index
Fetch the complete documentation index at: https://docs.termyte.xyz/llms.txt
Use this file to discover all available pages before exploring further.
Getting Started
Termyte protects your environment by gating agent actions through a Safety Runtime.Step 1: Initialize Termyte
Run the initialization command to generate your device ID and prepare your local environment:Step 2: Activate the Protocol
For Termyte to be effective, your agent must use the provided safety tools. The initialization command creates aTERMYTE_PROTOCOL.md file with instructions for the agent.
Recommendation: Add the following to your agent’s “Custom Instructions” or project-level rules (e.g., .clauderules or .cursorrules):
“Read and follow the safety protocol defined in TERMYTE_PROTOCOL.md. Usecontext_buildto initialize tasks andexecutefor all shell commands.”
Step 3: Verify Protection
- Restart your agent to load the Termyte MCP server.
-
Try a “Dangerous” Command:
Ask your agent to perform a blocked action:
“Try to run: rm -rf /”
-
Check the Audit Trail:
Verify that Termyte intercepted and blocked the command:
Introduction | Why Termyte? | Architecture