# TripWire Similar Solutions Matrix

TripWire v1 draws design inspiration from endpoint control, policy-as-code, and agent runtime guardrail systems.

## Adjacent products and projects

- ThreatLocker Platform: <https://www.threatlocker.com/platform>
- ThreatLocker application allowlisting model: <https://www.threatlocker.com/blog/what-is-application-allowlisting>
- OpenAI Agents JS guardrails: <https://openai.github.io/openai-agents-js/guides/guardrails>
- OpenAI human-in-the-loop: <https://openai.github.io/openai-agents-js/guides/human-in-the-loop/>
- LangChain middleware: <https://docs.langchain.com/oss/javascript/langchain/middleware>
- NVIDIA NeMo Guardrails: <https://github.com/NVIDIA/NeMo-Guardrails>
- Open Policy Agent docs: <https://www.openpolicyagent.org/docs/latest/>
- Lakera Guard docs: <https://docs.lakera.ai/guard>
- Pangea AI Guard overview: <https://pangea.cloud/docs/ai-guard/overview>
- Tetragon runtime enforcement: <https://tetragon.io/docs/overview/>

## Positioning summary

- ThreatLocker analog: deterministic, enforceable policy controls before execution.
- Agent runtime analog: native tool-call interception + human approval paths.
- TripWire differentiation: local-first edge-ready pre-tool hook with explainable policy decisions and lightweight anomaly escalation.
