Troubleshooting¶
Common issues and how to fix them.
rampart: command not found¶
The rampart binary isn't in your PATH.
If you installed with Homebrew:
If you installed with go install:
Add Go's bin directory to your PATH:
Or symlink to a standard location:
Commands aren't being blocked¶
If your agent is running commands that should be denied:
1. Are hooks installed?¶
If hooks aren't showing, reinstall:
2. Is your policy loading?¶
Rampart looks for policies in this order:
- Path specified via
--configflag ~/.rampart/policies/directory (all.yamlfiles merged)- Built-in
standardprofile (default)
3. Does your rule actually match?¶
Dry-run a specific command:
Or pipe raw hook JSON:
If the result is allow when you expect deny, your pattern doesn't match. Check:
- Glob patterns use
*(matches anything) not regex command_matchespatterns match the full command string- Use
rampart policy lintto catch typos and common mistakes
Everything is blocked¶
If every command gets denied, you probably have default_action: deny without enough allow rules.
Quick fix — switch to allow-by-default:
Better fix — start from an example template:
Don't use deny as default until you're ready
The lockdown template (default_action: deny) requires a complete allowlist. Start with standard or an example template and add deny rules for specific things.
Hook error on Claude Code startup¶
If Claude Code shows an error about hooks failing, the most common cause is that rampart isn't in the PATH that Claude Code sees.
Fix — symlink to a standard location:
Verify the hook config:
You should see rampart hook in the PreToolUse hooks. If the path is wrong, re-run:
How do I uninstall?¶
Remove the hooks from your agent:
This only removes the hooks — your policy and audit files stay in ~/.rampart/.
To fully remove:
# Remove hooks
rampart setup claude-code --remove
# Remove the binary
brew uninstall rampart # or: rm $(which rampart)
# Optionally remove config and audit data
rm -rf ~/.rampart
How do I check if it's working?¶
# Health check
rampart doctor
# Quick status
rampart status
# Dry-run a command against your policy
rampart test "rm -rf /"
rampart test --tool read "/etc/shadow"
OpenClaw plugin not intercepting tool calls¶
Check if the plugin is installed:
openclaw plugins list
# Should show: rampart v0.9.12 ✓ active
rampart doctor
# Should show: ✓ OpenClaw plugin: installed (before_tool_call hook active)
Plugin missing — reinstall:
OpenClaw version too old:
The native plugin requires OpenClaw >= 2026.3.28. Upgrade:
Rampart serve not running:
The plugin calls localhost:9090 on every tool call. If serve isn't running, sensitive tools such as exec and write block instead of silently bypassing policy. Lower-risk tools listed in the plugin's failOpenTools config can still fail open.
Still stuck?¶
- Check GitHub Issues
- Run
rampart doctorand include the output in your issue - Email rampartsec@pm.me