gateguard
GateGuard(ゲートガード)は、AIエージェントが編集、書き込み、またはBashコマンドを実行する前に推測するのを防ぐ、事実強制型の事前アクションゲートです。関連する事実(インポートファイル、データスキーマ、ユーザー指示など)を調査するよう強制することで、非ゲート型エージェントと比較して出力品質を2.25ポイント向上させます。拒否、強制調査、許可の3段階ゲートにより、AIエージェントが仮定ではなく事実に基づいて操作することを保証します。
git clone https://github.com/affaan-m/everything-claude-code.gitBefore / After 効果比較
1 组GateGuardで保護されていないAIエージェントは、コードの変更や新規ファイルの作成時に推測や不十分な自己評価に頼りがちです。これにより、設計の深さが不足したり、既存のコードベースとの互換性が失われたり、発見が困難なバグが導入されたりし、平均品質スコアはわずか6.75/10でした。
GateGuardを導入すると、AIエージェントはアクションを実行する前に、インポートファイルの一覧表示、データスキーマの確認、ユーザー指示の確認など、事実を調査するよう強制されます。この強制的な調査により、エージェントのコンテキスト認識と意思決定の質が向上し、平均出力品質スコアは9.0/10に向上しました。
GateGuard — Fact-Forcing Pre-Action Gate
A PreToolUse hook that forces Claude to investigate before editing. Instead of self-evaluation ("are you sure?"), it demands concrete facts. The act of investigation creates awareness that self-evaluation never did.
When to Activate
- Working on any codebase where file edits affect multiple modules
- Projects with data files that have specific schemas or date formats
- Teams where AI-generated code must match existing patterns
- Any workflow where Claude tends to guess instead of investigating
Core Concept
LLM self-evaluation doesn't work. Ask "did you violate any policies?" and the answer is always "no." This is verified experimentally.
But asking "list every file that imports this module" forces the LLM to run Grep and Read. The investigation itself creates context that changes the output.
Three-stage gate:
1. DENY — block the first Edit/Write/Bash attempt
2. FORCE — tell the model exactly which facts to gather
3. ALLOW — permit retry after facts are presented
No competitor does all three. Most stop at deny.
Evidence
Two independent A/B tests, identical agents, same task:
| Task | Gated | Ungated | Gap |
|---|---|---|---|
| Analytics module | 8.0/10 | 6.5/10 | +1.5 |
| Webhook validator | 10.0/10 | 7.0/10 | +3.0 |
| Average | 9.0 | 6.75 | +2.25 |
Both agents produce code that runs and passes tests. The difference is design depth.
Gate Types
Edit / MultiEdit Gate (first edit per file)
MultiEdit is handled identically — each file in the batch is gated individually.
Before editing {file_path}, present these facts:
1. List ALL files that import/require this file (use Grep)
2. List the public functions/classes affected by this change
3. If this file reads/writes data files, show field names, structure,
and date format (use redacted or synthetic values, not raw production data)
4. Quote the user's current instruction verbatim
Write Gate (first new file creation)
Before creating {file_path}, present these facts:
1. Name the file(s) and line(s) that will call this new file
2. Confirm no existing file serves the same purpose (use Glob)
3. If this file reads/writes data files, show field names, structure,
and date format (use redacted or synthetic values, not raw production data)
4. Quote the user's current instruction verbatim
Destructive Bash Gate (every destructive command)
Triggers on: rm -rf, git reset --hard, git push --force, drop table, etc.
1. List all files/data this command will modify or delete
2. Write a one-line rollback procedure
3. Quote the user's current instruction verbatim
Routine Bash Gate (once per session)
1. The current user request in one sentence
2. What this specific command verifies or produces
Quick Start
Option A: Use the ECC hook (zero install)
The hook at scripts/hooks/gateguard-fact-force.js is included in this plugin. Enable it via hooks.json.
If GateGuard blocks setup or repair work, start the session with
ECC_GATEGUARD=off. For hook-level control, keep using
ECC_DISABLED_HOOKS with the GateGuard hook ID.
Option B: Full package with config
pip install gateguard-ai
gateguard init
This adds .gateguard.yml for per-project configuration (custom messages, ignore paths, gate toggles).
Anti-Patterns
- Don't use self-evaluation instead. "Are you sure?" always gets "yes." This is experimentally verified.
- Don't skip the data schema check. Both A/B test agents assumed ISO-8601 dates when real data used
%Y/%m/%d %H:%M. Checking data structure (with redacted values) prevents this entire class of bugs. - Don't gate every single Bash command. Routine bash gates once per session. Destructive bash gates every time. This balance avoids slowdown while catching real risks.
Best Practices
- Let the gate fire naturally. Don't try to pre-answer the gate questions — the investigation itself is what improves quality.
- Customize gate messages for your domain. If your project has specific conventions, add them to the gate prompts.
- Use
.gateguard.ymlto ignore paths like.venv/,node_modules/,.git/.
Related Skills
safety-guard— Runtime safety checks (complementary, not overlapping)code-reviewer— Post-edit review (GateGuard is pre-edit investigation)
ユーザーレビュー (0)
レビューを書く
レビューなし
統計データ
ユーザー評価
この Skill を評価