2025-11-03 · Authensor

Deny-by-Default

Deny-by-default is a security architecture in which all actions are blocked unless an explicit policy rule grants permission, ensuring that no operation proceeds without prior authorization.

In Detail

Deny-by-default inverts the assumption that most systems make. In an allow-by-default system, everything is permitted unless a rule specifically prohibits it. The administrator must anticipate every dangerous action and write a rule to block it. Any action the administrator fails to foresee is allowed.

Deny-by-default reverses this. Nothing is permitted unless the administrator has written a rule that explicitly allows it. The administrator defines the set of safe actions, and everything outside that set is automatically blocked. The burden shifts from "imagine every possible threat" to "define what is known to be safe."

This distinction has significant consequences:

In traditional software, the choice between these architectures involves trade-offs. Deny-by-default can impede legitimate functionality if policies are incomplete. However, for AI agents, the calculus shifts decisively. AI agents act autonomously, can generate novel action sequences not anticipated by developers, and operate at speeds that preclude real-time human review. An allow-by-default system for AI agents means any action the policy author did not foresee — including actions the agent invents through emergent behavior — proceeds unchecked.

Deny-by-default is the standard security posture in firewalls, operating system permissions, and access control lists. Its application to AI agent security follows the same logic: the attack surface of an autonomous system is too large to enumerate every threat, so the safe approach is to enumerate only what is permitted.

Examples

Related Concepts

In SafeClaw

SafeClaw, by Authensor, implements deny-by-default as its foundational architecture. When SafeClaw is active, an AI agent cannot perform any action — file read, file write, shell execution, or network request — unless a policy rule explicitly permits it.

This means that configuring SafeClaw is an allowlisting process. Administrators define rules that describe the actions their agents are permitted to take, and all other actions are denied. There is no need to anticipate every dangerous command or risky file path; only the known-safe operations require rules.

SafeClaw's policy evaluation uses a first-match-wins model against an ordered rule set. If no rule matches an action, the default verdict is deny. This ensures that policy gaps result in blocked actions rather than unauthorized operations.

The deny-by-default posture is particularly important for SafeClaw's target environment: autonomous AI agents powered by Claude, OpenAI, or LangChain. These agents can generate arbitrary action sequences, and a single uncontrolled action can have irreversible consequences. SafeClaw's architecture ensures that agent autonomy operates within explicitly defined boundaries.

SafeClaw is 100% open source (MIT license), runs locally with sub-millisecond policy evaluation, and can be installed with npx @authensor/safeclaw. The free tier includes 7-day renewable keys with no credit card required.

Try SafeClaw

Action-level gating for AI agents. Set it up in your browser in 60 seconds.

$ npx @authensor/safeclaw