Supports human-in-the-loop safety by providing a mobile app for users to receive and respond to operation approval requests.
Integrates with GitHub Issues to allow AI agents to search, retrieve, create, and update issues with continuous synchronization.
Enables integration with GitLab Issues for automated issue tracking, indexing, and management of sensitive operations.
Supports human-in-the-loop safety via iOS and Apple Watch apps for receiving and managing operation approval notifications.
Provides integration with Jira Cloud and Server to manage issue lifecycles, perform vector searches, and evaluate issue compliance.
Provides notification integration for Enterprise users to route intercepted operation approval requests to Mattermost.
Provides notification integration for Enterprise users to route intercepted operation approval requests to Slack.
Preloop: The Policy Engine for AI Agents
Preloop is a comprehensive MCP firewall that gives you complete control over what AI agents can do. Define access policies, approval workflows, and audit trails. Allow, deny, or require approval based on conditions.
Works with OpenClaw, Claude Code, Cursor, Codex, and any MCP-compatible agent.
Why Preloop?
AI agents like Claude Code, Cursor, and OpenClaw are transforming how we work. But with great power comes great risk:
Accidental deletions. One wrong command and your production database is gone.
Leaked secrets. API keys pushed to public repos before anyone notices.
Runaway costs. Agents spinning up expensive resources without limits.
Breaking changes. Untested deployments to production at 3am.
Most teams face an impossible choice: give AI full access and move fast (but dangerously), or lock everything down and lose the productivity gains.
Preloop solves this. Define policies that allow safe operations, deny dangerous ones, and require human approval for everything in between. You stay in control. AI handles the routine work.
Core Capabilities
Access Policies
Define fine-grained access controls for any AI tool or operation:
Tools support multiple ordered access rules (not just simple approval/deny)
Rules are evaluated in priority order; first matching rule wins
Each rule has an action (allow/deny/require_approval), optional CEL condition, and optional denial message
Rules can be reordered via drag-and-drop in the UI
Approval Workflows
When AI attempts a protected operation, Preloop pauses and notifies you:
Instant notifications via mobile app, Slack, email, or Mattermost
One-tap approvals from your phone, watch, or desktop
Team-based approvals with quorum requirements (Enterprise)
Escalation policies for time-sensitive operations (Enterprise)
Policy-as-Code
Define policies in YAML, manage via CLI or API:
Version control your policies alongside your code
GitOps workflows for policy changes
CLI management for automation and scripting
API access for programmatic policy management
Complete Audit Trail
Every AI action is logged with full context:
What was attempted (tool, parameters, context)
Which policy matched and why
Who approved or rejected (and when)
Execution result and duration
Essential for security reviews, compliance, and debugging.
Comparison with AWS Agent Core
Feature | Preloop | AWS Agent Core |
Open source | ✅ | ❌ |
Self-hosted option | ✅ | ❌ |
Policy-as-code (YAML) | ✅ | Limited |
MCP native | ✅ | ❌ |
Works with any agent | ✅ | AWS-focused |
Human approval workflows | ✅ | ✅ |
Audit trail | ✅ | ✅ |
CLI management | ✅ | AWS CLI |
GitOps-friendly | ✅ | Limited |
Mobile app approvals | ✅ | ❌ |
Team-based approvals | ✅ (Enterprise) | ✅ |
Preloop is the open-source alternative to AWS Agent Core for teams who want vendor-neutral, self-hosted AI governance.
How it works:
Define policies for each tool: allow, deny, or require approval
Policies can be fine-grained, checking parameter values and context
AI agents call tools through Preloop's MCP proxy
Actions are allowed, denied, or paused for approval based on your policies
Full audit trail of every action and decision
Key Features
Safety & Control
Policy Engine. Define allow, deny, and approval policies for any tool or action.
Access Rules. Multiple ordered rules per tool with allow/deny/require approval actions.
Drag-and-Drop Priority. Reorder rule evaluation priority visually.
Fine-Grained Rules. Policies can check tool names, parameter values, and context.
Instant Notifications. Get alerts on mobile, Slack, email, or Mattermost.
One-Tap Approvals. Approve or reject from your phone, watch, or desktop.
Full Audit Trail. Complete log of every AI action and policy decision.
Flexible Conditions. Use CEL expressions for context-aware rules (Enterprise).
AI Approval (Enterprise). AI-driven approval with configurable model, prompt, confidence threshold, and fallback behavior.
Team Approvals. Require quorum from multiple team members for critical ops (Enterprise).
Integration & Compatibility
MCP Proxy. Works with any Model Context Protocol-compatible AI agent.
Zero Infrastructure Changes. Drop-in solution, no code modifications needed.
Built-in Tools. 11 tools for issue and PR/MR management included.
External MCP Servers. Proxy any external MCP server through Preloop's safety layer.
Issue Tracker Sync. Connect Jira, GitHub, GitLab for full context.
Automation Platform
Agentic Flows. Build event-driven workflows triggered by webhooks, schedules, or tracker events.
Vector Search. Intelligent similarity search using embeddings.
Duplicate Detection. Automatically identify overlapping issues.
Compliance Metrics. Evaluate and improve issue quality.
Web UI. Modern interface built with Lit, Vite, and Shoelace.
Looking for Enterprise features? Preloop Enterprise Edition adds RBAC, team-based approvals, advanced audit logging, and more. See Enterprise Features below.
Open Source vs Enterprise (important)
Open Source: single-user approvals with email + mobile app notifications.
Enterprise: adds advanced conditions (CEL), team-based approvals (quorum), escalation, and Slack & Mattermost notifications.
Mobile & Watch apps: the iOS/Watch and Android apps can be used with self-hosted / open-source Preloop deployments.
Supported Issue Trackers
Jira Cloud and Server
GitHub Issues
GitLab Issues
(More to be added in future releases, including Azure DevOps and Linear)
Architecture
Preloop is designed with a modular architecture:
Preloop (
./backend/preloop): The main RESTful HTTP API server that provides access to issue tracking systems and vector search capabilities.Preloop Models (
./backend/preloop/models): Contains the database models (using SQLAlchemy and Pydantic) and CRUD operations for interacting with the PostgreSQL database, including vector embeddings via PGVector.Preloop Sync (
./backend/preloop/sync): A service responsible for polling configured issue trackers, indexing issues, projects, and organizations in the database, and updating issue embeddings.Preloop Console (
./frontend): A web application built using Lit, Vite, TypeScript, and Shoelace Web Components.
This structure allows:
Clear separation of concerns between the API layer, data models, and synchronization logic.
Independent development and versioning of the core components.
Preloop Console
The Preloop Console is in the frontend directory. It is built using modern web technologies to provide a fast, responsive, and feature-rich user experience.
Technology Stack: Lit, Vite, TypeScript, and Shoelace Web Components.
Installation
Prerequisites
Python 3.11+
PostgreSQL 14+
PGVector extension for PostgreSQL (for vector search capabilities)
Local Setup
Configuration
Environment Variables
Preloop is configured via environment variables. Copy .env.example to .env and customize as needed.
Core Settings
Variable | Default | Description |
|
| PostgreSQL connection string |
| (required) | Secret key for JWT tokens |
|
| Environment (development, production) |
|
| Log level (DEBUG, INFO, WARNING, ERROR) |
Feature Flags
Variable | Default | Description |
|
| Enable self-registration. Set to |
Disabling Self-Registration
For private deployments where you want to control who can access the system:
When registration is disabled:
The "Sign Up" button is hidden from the UI
The
/registerpage redirects to/loginThe - preventing direct API registration attempts
New users must be invited by an administrator
Security Note: With REGISTRATION_ENABLED=false, the backend API enforces the restriction at the endpoint level. Any attempt to register via the API (including scripts or direct HTTP requests) will be rejected with a 403 status code.
To invite users when registration is disabled, use the admin API or CLI (Enterprise Edition includes a full admin dashboard for user management).
GitHub App (Optional)
For enhanced GitHub integration including PR status checks and bot reactions:
Variable | Default | Description |
| GitHub App ID (from app settings page) | |
| GitHub App slug (the URL-friendly name) | |
| Base64-encoded private key from GitHub App | |
| OAuth client ID for user authentication | |
| OAuth client secret | |
| Secret for verifying webhook payloads |
These are optional and only needed if you're using a GitHub App for authentication or advanced features like reaction management on PRs.
OAuth Sign-In (Enterprise)
Enable OAuth sign-in/sign-up via GitHub, Google, and/or GitLab. Users can authenticate with their existing provider accounts instead of creating a Preloop-specific password.
Variable | Default | Description |
| Google OAuth 2.0 client ID | |
| Google OAuth 2.0 client secret | |
| GitLab OAuth client ID | |
| GitLab OAuth client secret | |
|
| GitLab instance URL (for self-hosted) |
GitHub OAuth sign-in reuses the GitHub App credentials above. Enable via Helm values:
Supported flows:
GitHub: Sign-in + automatic tracker setup prompt
Google: Sign-in only (no tracker created)
GitLab: Sign-in + automatic tracker setup prompt
MCP OAuth 2.1 Server
Preloop includes a built-in OAuth 2.1 Authorization Server for MCP client authentication (e.g., Claude Desktop). This is enabled automatically when mcpOauth.enabled=true.
Variable | Default | Description |
|
| Public URL of your Preloop instance (used for OAuth discovery endpoints) |
Discovery endpoints:
GET /.well-known/oauth-authorization-server— RFC 8414 metadataGET /.well-known/oauth-protected-resource— RFC 9728 metadata
OAuth endpoints:
POST /oauth/register— Dynamic Client Registration (RFC 7591)GET /oauth/authorize— Authorization endpoint (redirects to consent page)POST /oauth/token— Token exchange (Authorization Code + PKCE for MCP, JWT for CLI)POST /oauth/revoke— Token revocation
Docker Setup
See docker-compose.release.yaml for full configuration and required environment variables.
Release Management
Use the release script to prepare a new version (updates Helm chart, packages artifacts):
See scripts/release.sh for details.
Kubernetes Setup
Preloop can be deployed to Kubernetes using the provided Helm chart:
For more details about the Helm chart, see the chart README.
Usage
Starting the Server
Set Environment Variables: Ensure you have a
.envfile configured with the necessary environment variables (see.env.example). Key variables include database connection details, API keys, etc.Start Preloop API: Use the provided script to start the main API server:
./start.shThis script typically handles activating the virtual environment and running the server (e.g.,
python -m preloop.server).Start Preloop Sync Service: In a separate terminal, start the synchronization service to begin indexing data from your configured trackers:
# Activate the virtual environment if not already active # source .venv/bin/activate preloop-sync scan allThis command tells Preloop Sync to scan all configured trackers and update the database.
API Documentation
When running, the API documentation is available at:
The OpenAPI specification is also available at:
Using the REST API
Preloop provides a RESTful HTTP API:
API Endpoints
Preloop provides a RESTful API with the following key endpoints:
Authentication
POST /api/v1/auth/token- Get authentication tokenPOST /api/v1/auth/refresh- Refresh authentication token
MCP Server Management
GET /api/v1/mcp-servers- List configured MCP serversPOST /api/v1/mcp-servers- Add new MCP serverPUT /api/v1/mcp-servers/{id}- Update MCP server configurationDELETE /api/v1/mcp-servers/{id}- Remove MCP serverPOST /api/v1/mcp-servers/{id}/scan- Trigger tool discovery scanGET /api/v1/mcp-servers/{id}/tools- List tools available on server
Tool Configuration
GET /api/v1/tool-configurations- List tool configurationsPOST /api/v1/tool-configurations- Create tool configurationPUT /api/v1/tool-configurations/{id}- Update tool configurationDELETE /api/v1/tool-configurations/{id}- Delete tool configuration
Access Rules
POST /api/v1/tool-configurations/{config_id}/access-rules- Create access rulePUT /api/v1/access-rules/{rule_id}- Update access ruleDELETE /api/v1/access-rules/{rule_id}- Delete access rule
Approval Management
GET /api/v1/approval-policies- List approval policiesPOST /api/v1/approval-policies- Create approval policyPUT /api/v1/approval-policies/{id}- Update approval policyDELETE /api/v1/approval-policies/{id}- Delete approval policyGET /api/v1/approval-requests- List approval requests (authenticated)GET /api/v1/approval-requests/{request_id}- Get approval request details (authenticated)POST /api/v1/approval-requests/{request_id}/approve- Approve request (authenticated)POST /api/v1/approval-requests/{request_id}/decline- Decline request (authenticated)POST /api/v1/approval-requests/{request_id}/decide- Approve or decline request (authenticated)GET /approval/{request_id}/data?token={token}- Get approval request details (public, token-based)POST /approval/{request_id}/decide?token={token}- Approve or decline approval request (public, token-based)
Flows
GET /api/v1/flows- List flowsPOST /api/v1/flows- Create flowGET /api/v1/flows/{id}- Get flow detailsPUT /api/v1/flows/{id}- Update flowDELETE /api/v1/flows/{id}- Delete flowPOST /api/v1/flows/{id}/trigger- Trigger a test execution for a flowGET /api/v1/flows/{id}/executions- List flow executionsGET /api/v1/flows/executions/{id}- Get execution detailsGET /api/v1/flows/executions/{id}/logs- Get execution logs (from container or database)GET /api/v1/flows/executions/{id}/metrics- Get execution metrics (tool calls, tokens, cost)POST /api/v1/flows/executions/{id}/command- Send command to execution (e.g., stop)POST /api/v1/flows/executions/{id}/retry- Retry a failed/stopped/cancelled execution
Trackers
GET /api/v1/trackers- List trackersGET /api/v1/trackers/{tracker_id}- Get tracker detailsPOST /api/v1/trackers- Create trackerPUT /api/v1/trackers/{tracker_id}- Update trackerDELETE /api/v1/trackers/{tracker_id}- Delete tracker
Organizations
GET /api/v1/organizations- List organizationsGET /api/v1/organizations/{org_id}- Get organization detailsPOST /api/v1/organizations- Create organizationPUT /api/v1/organizations/{org_id}- Update organizationDELETE /api/v1/organizations/{org_id}- Delete organization
Projects
GET /api/v1/organizations/{org_id}/projects- List projectsGET /api/v1/projects/{project_id}- Get project detailsPOST /api/v1/projects- Create projectPUT /api/v1/projects/{project_id}- Update projectDELETE /api/v1/projects/{project_id}- Delete projectPOST /api/v1/projects/test-connection- Test project connection
Issues
GET /api/v1/issues/search- Search issuesPOST /api/v1/issues- Create issueGET /api/v1/issues/{issue_id}- Get issue detailsPUT /api/v1/issues/{issue_id}- Update issueDELETE /api/v1/issues/{issue_id}- Delete issuePOST /api/v1/issues/{issue_id}/comments- Add comment to issue
Unified WebSocket
Preloop uses a unified WebSocket connection for real-time updates across the application:
Connection: ws://localhost:8000/api/v1/ws/unified
Message Routing:
Flow execution updates (
flow_executionstopic)Approval request notifications (
approvalstopic)System activity updates (
activitytopic)Session events (
systemtopic)
Features:
Automatic reconnection with exponential backoff
Pub/sub message routing to subscribers
Topic-based filtering for efficient message delivery
Session management with activity tracking
Heartbeat monitoring
Usage in Frontend:
Using MCP Tools via API
The Preloop API now includes integrated MCP tool endpoints with dynamic tool filtering, allowing any HTTP-based MCP client to connect directly. This is the recommended way to automate issue management workflows.
Authentication: All MCP endpoints use the same Bearer Token authentication as the rest of the API.
Dynamic Tool Visibility: MCP tools are only visible when your account has one or more trackers configured. This ensures tools have the necessary context to operate effectively. If you connect with an account that has no trackers, you will see an empty tool list.
Connecting with Claude Code:
You can connect Claude Code directly to your Preloop instance using the claude mcp add command.
Get your Preloop API Key: You can find or create an API key in your Preloop user settings.
Add the MCP Server: Run the following command, replacing
YOUR_PRELOOP_URLandYOUR_API_KEYwith your details.claude mcp add \ --transport http \ --header "Authorization: Bearer YOUR_API_KEY" \ preloop \ https://YOUR_PRELOOP_URL/mcp/v1--transport http: Specifies that the server uses the HTTP transport.--header "Authorization: Bearer YOUR_API_KEY": Provides the necessary authentication header for all requests.preloop: This is the name you will use to refer to the server (e.g.,@preloop get_issue ...).https://YOUR_PRELOOP_URL/mcp/v1: This is the base URL for the Preloop MCP endpoints.
Example Workflow (using
If you are not using an MCP client and want to interact with the tool endpoints directly, you can use any HTTP client like curl.
Create an Issue:
curl -X POST "https://YOUR_PRELOOP_URL/api/v1/mcp/create_issue" \ -H "Authorization: Bearer YOUR_API_KEY" \ -H "Content-Type: application/json" \ -d '{ "project": "your-org/your-project", "title": "New Feature Request", "description": "Add a dark mode to the dashboard." }'
Tool Approval Workflows
Preloop provides approval workflows for tool execution. Control which operations require approval before execution.
Key Concepts:
Tool Configuration: Enable/disable tools and assign approval policies
Approval Policies: Define approval requirements, approvers, timeouts, and notification channels
Email Notifications: Receive approval requests via email with one-click approve/decline
Example: Create an Approval Policy
Configure a tool to require approval:
Enterprise Features: Preloop Enterprise Edition adds CEL-based conditional approvals, team-based approvals with quorum, escalation policies, and multi-channel notifications (Slack, Mattermost, mobile push). Contact sales@spacecode.ai for more information.
Mobile Push Notifications (iOS/Android)
Open-source users can enable mobile push notifications by proxying requests through the production Preloop server at https://preloop.ai.
Setup Steps:
Create an account at https://preloop.ai
Generate an API key with
push_proxyscope from the Settings pageConfigure your instance with these environment variables:
Enable push notifications in the Notification Preferences page in your Preloop Console
Register your mobile device by scanning the QR code shown in Notification Preferences
Once configured, approval requests will trigger push notifications on your registered iOS or Android devices.
Note: The mobile apps (iOS/Watch and Android) are designed to work with self-hosted Preloop instances. They connect to your server URL extracted from the QR code.
Version Checking & Updates
By default, Preloop checks for version updates by contacting https://preloop.ai on startup and once daily. This helps you stay informed about new releases and security updates.
Privacy: Only instance UUID, version number, and IP address are sent. No user data is transmitted.
Opt-out: Set PRELOOP_DISABLE_TELEMETRY=true or DISABLE_VERSION_CHECK=true to disable version checking and telemetry entirely.
For detailed architecture, see ARCHITECTURE.md.
Testing
Preloop uses pytest for unit and integration testing. The test suite covers API endpoints, database models, and tracker integrations.
Running Tests
To run all tests:
Test Structure
Unit Tests: Located in
tests/directory, testing individual components in isolationIntegration Tests: Test the interaction between components
Endpoint Tests: Test API endpoints with mocked database sessions
Testing Webhooks
The webhook endpoint tests (tests/endpoints/test_webhooks.py) validate:
Authentication via signatures/tokens for GitHub and GitLab webhooks
Error handling for invalid signatures, missing tokens, etc.
Organization identifier resolution
Database updates (last_webhook_update timestamp)
Error handling for database failures
These tests use mocking to isolate the webhook handling logic from external dependencies.
Enterprise Features
Preloop Enterprise Edition extends the open-source core with additional features for teams and organizations:
Feature | Open Source | Enterprise |
MCP Server with 11 built-in tools | ✅ | ✅ |
Basic approval workflows | ✅ | ✅ |
Email notifications | ✅ | ✅ |
Mobile app notifications (iOS/Watch; Android) | ✅ | ✅ |
Issue tracker integration | ✅ | ✅ |
Vector search & duplicate detection | ✅ | ✅ |
Agentic flows | ✅ | ✅ |
Web UI | ✅ | ✅ |
Role-Based Access Control (RBAC) | ❌ | ✅ |
Team management | ❌ | ✅ |
CEL conditional approval policies | ❌ | ✅ |
Access rules with CEL conditions | Basic (single condition) | Advanced (multiple conditions, AND/OR, CEL editor) |
AI-driven approval policies | ❌ | ✅ |
Team-based approvals with quorum | ❌ | ✅ |
Approval escalation | ❌ | ✅ |
Slack notifications | ❌ | ✅ |
Mattermost notifications | ❌ | ✅ |
Admin dashboard | ❌ | ✅ |
Audit logging & impersonation tracking | ❌ | ✅ |
Billing & subscription management | ❌ | ✅ |
Priority support | ❌ | ✅ |
Contact sales@spacecode.ai for Enterprise Edition licensing.
Contributing
Contributions are welcome! Please see our Contributing Guidelines for details on how to get started.
Fork the repository
Create your feature branch (
git checkout -b feature/amazing-feature)Commit your changes (
git commit -m 'Add some amazing feature')Push to the branch (
git push origin feature/amazing-feature)Open a Pull Request
License
Preloop is open source software licensed under the Apache License 2.0.
Copyright (c) 2026 Spacecode AI Inc.