How It Works
When an agent runs a package install command (e.g.,npm install, pip install, cargo add), Jinzo intercepts the command, extracts the package names, and checks them against the configured guard service. If any package fails the security check, the command is denied before it executes.
This works across all three agent runtimes:
| Agent | Mechanism |
|---|---|
| Claude | PreToolUse hook on Bash commands |
| Copilot | Pre-tool-use hook on shell/bash tools |
| Codex | Dynamic tools check before execution |
Supported Ecosystems
Guards detect install commands for multiple package managers:| Ecosystem | Commands detected |
|---|---|
| npm | npm install, npm add, yarn add, pnpm add |
| Python | pip install, pip3 install |
| Cargo | cargo add, cargo install |
| Go | go get, go install |
| RubyGems | gem install, bundle add |
Socket.dev
Jinzo uses Socket.dev as the guard provider. Socket analyzes packages for supply chain risks, known vulnerabilities, and suspicious behavior.Setup
What Gets Checked
For each package, Socket.dev returns:| Field | Description |
|---|---|
| Overall score | 0-1 health score based on multiple risk factors |
| Risk level | critical, high, medium, low, or none |
| Alerts | Specific security issues (malware, typosquat, etc) |
