COMPUTER POLICE

A LOCAL SUPPLY-CHAIN FIREWALL

Stop agents from installing malware.

Computer Police is a local registry proxy that blocks confirmed-malicious npm and pip installs before they touch your disk. For developers, CI, and coding agents.

curl -fsSL https://computer.police.dev/install | bash
computer-police install

Open source · MIT · macOS, Linux, Windows · by Vidoc Security

Registries
npm · pypi · others
COMPUTER POLICE
Inspect install request
Match against OSV malware feed
Block · pass through · log
Claude Code
Codex
OpenCode
Your shell
Every npm install, pip install, or uv add from any of these routes through Computer Police first.

THE PROBLEM

Why this exists.

  1. 01

    Agents install packages you never reviewed.

    Claude Code, Codex, Cursor, OpenCode, custom harnesses — they all call npm install and pip install on your behalf, dozens of times a day. You see the diff after the fact, if at all.

  2. 02

    Real malware ships on real registries, weekly.

    npm and PyPI publish malicious packages on a steady cadence. Typosquats, hijacked maintainers, dependency-confusion. The window between publication and detection is small — but it is wide enough to compromise a laptop.

  3. 03

    Existing tools run too late.

    Audits, lockfile scans, and CVE dashboards see the package after it is already on disk and possibly already executed via a lifecycle script. The block has to happen at install time.

WHO IT'S FOR

Built for three jobs.

Developers using AI coding agents

You let Claude Code, Codex, Cursor, or OpenCode install whatever it needs. You want a safety net that does not slow you down or cry wolf.

CI/CD operators

Every PR runs npm ci, pip install, or uv sync. You want supply-chain protection without changing the build.

Teams running agent sandboxes

Devcontainers, remote VMs, GitHub Actions runners. Bake protection into the image once and forget about it.

HOW IT WORKS

Three steps. No agent changes.

  1. 1. Install

    One curl command. No root, no kernel extension, no system proxy.

    curl -fsSL https://computer.police.dev/install | bash
  2. 2. Enable

    Points your package managers at 127.0.0.1:4873. Reversible.

    computer-police install
  3. 3. Forget about it

    Allowed installs pass through. Confirmed malware gets a 403.

    $ npm install some-known-malicious-package@1.2.3
    npm error code E403
    npm error 403 403 Forbidden - GET http://127.0.0.1:4873/...
    npm error 403 blocked by computer-police: OSV MAL-2026-XXXX
    
    $ computer-police ledger list --limit 3
    15:27  bun   left-pad                  CAUGHT
    15:25  npm   @playwright/mcp           BLOCK
    15:22  npm   react                     OK

DESIGN GOAL

Low noise. One job.

If Computer Police blocks an install, the package version is already listed as malware by a public OSV advisory. No noise, no false alarms.

PRIVACY & TRUST

Local-first by design.

Everything runs on your machine. The only outbound network call is fetching the public OSV malicious-package advisory snapshot. No telemetry. No analytics. No package names, lockfiles, or install history leaving your machine.

Open source · MIT No root required Reversible Zero external Go deps

COVERAGE

Works with your stack.

Status Ecosystem Package managers
Supported JavaScript · TypeScript · Node npm · yarn · pnpm · bun
Supported Python / PyPI pip · uv · poetry · pdm · pipx
Planned Conda, Ruby, PHP, Rust, Go, JVM, .NET See roadmap

Install Computer Police.

One curl. Safe to try. Removable with computer-police uninstall.

curl -fsSL https://computer.police.dev/install | bash
computer-police install