About TameFlare

TameFlare is a governance layer for AI agents. It sits between your agents and the tools they use, enforcing policies on every action before it executes.

Why this exists

AI agents are getting access to production systems - source control, payment processors, infrastructure, communication tools. Most agent frameworks have few or no runtime guardrails beyond prompt instructions. The agent decides what to do and does it.

TameFlare exists because agents need architectural enforcement, not just prompt-level instructions. If an agent's API keys live inside the agent, no amount of system prompts can prevent misuse. TameFlare moves the keys to a gateway and requires a cryptographically signed, single-use token for every action.

The result: agents can't bypass policies because the enforcement is structural, not behavioral.

Project maturity

TameFlare is actively developed and source-available under the Elastic License v2 (ELv2). The core platform - transparent proxy gateway, connector system (GitHub, OpenAI, Anthropic, Stripe, Slack, Generic HTTP, Webhook, MCP), credential vault, per-gateway permissions, approval workflow, dashboard, and CLI - is complete and functional.

Current version

v0.8

First release

2025

Status

Active

Gateway v2 (proxy)

Stable

CLI v2

Stable

Dashboard

Stable

8 Connectors

Stable

Credential vault

Stable

Prometheus metrics

Stable

Rate limiting

Stable

SSO / SAML

Planned

License

TameFlare is licensed under the Elastic License v2 (ELv2). In short:

  • + Free to use, modify, and deploy
  • + Full source code available
  • + Commercial use permitted
  • Cannot be offered as a managed/hosted service by third parties
  • Cannot remove or alter licensing enforcement or functionality

Team & governance

TameFlare is built and maintained by a small team based in Denmark, EU. We believe in transparency about project sustainability, and our architecture reflects European values around data sovereignty and privacy.

Maintainers

Small team

Core contributors with full commit access

Governance

Benevolent dictator

Single decision-maker with community input

Bus factor

Low

Honest: key-person risk exists. Mitigated by source-available code.

Contributions

Welcome

See CONTRIBUTING.md for guidelines

What "low bus factor" means for you

  • + Source code is fully available - you can fork and maintain independently
  • + No vendor lock-in - source code is fully available for audit and forking
  • + ELv2 license allows commercial use and modification
  • If the maintainer becomes unavailable, no automatic succession plan
  • Enterprise customers should evaluate this risk against their requirements

Security audit status

TameFlare has not yet undergone a third-party security audit. The codebase is source-available for independent review. We have 51 unit tests, 220+ integration tests, and security-specific test coverage (auth bypass, RBAC, rate limiting, nonce replay, input validation).

A formal third-party audit is planned. See the Security documentation for full details on our testing approach and current coverage.

Get involved

Ready to evaluate TameFlare safely?

Start free for hands-on validation, or book an architecture call for your production and compliance requirements.