Repo-wide context leaks
Claude Code reads whatever it needs to solve the task: config files, .env, credentials, internal docs. Without governance, all of it can flow outbound as prompt context with no record of what was sent or why.
Anthropic's terminal coding agent reads your files, edits your code, and runs your shell. Raidu sits between Claude Code and the Anthropic API, redacts everything that should never leave, authorizes every tool call, and hands you a signed record of what actually happened.
Claude Code drives the terminal, reads the repo, edits files, and executes shell commands on your behalf. That surface area is the new audit boundary.
Claude Code is fast because it acts. Every action it takes is also a compliance event your auditor will ask about.
Claude Code reads whatever it needs to solve the task: config files, .env, credentials, internal docs. Without governance, all of it can flow outbound as prompt context with no record of what was sent or why.
Claude Code runs shell commands to test, install, deploy. A single unreviewed command can touch production, modify infrastructure, or execute a remote payload. There is no signed trail of what ran, against what policy, or who approved it.
When the agent commits code that reaches production, regulators ask who authored it, who reviewed it, and under what policy. Commit metadata alone is not evidence. A signed pre-commit record is.
A developer's Anthropic key opens the whole model. Inside regulated repos, you need per-repo policies, per-branch gates, and revocable scopes. Raw API keys give you none of that.
The same five-checkpoint runtime that governs every other Raidu-wrapped agent. No CLI change. No plugin. Point Claude Code at Raidu's Anthropic-compatible endpoint and you are done.
File context, shell output, and user instructions are scanned before they reach the Anthropic API. Secrets, keys, customer PII, and flagged internals are replaced with deterministic tokens the model still reasons with. Nothing unmasked leaves your network.
Every bash, edit, read, and write that Claude Code wants to invoke passes through a per-tool policy. Allowlist shell commands, restrict writes to specific paths, require approval for destructive operations. Denials are signed too.
Model output is inspected for hallucinated packages, insecure code, license-flagged snippets, and data-exfiltration attempts before it reaches the terminal. Clean output streams through. Risky output is held with a reason.
Every session becomes a chain of signed records: prompts, tool calls, responses, decisions, policy version, developer identity. RSA-4096 signed. SHA-256 chained. RFC 3161 timestamped. 10-year retention by default.
Claude Code honors the standard Anthropic client env vars. Route traffic through Raidu and every session is governed, scoped, and signed.
# Point Claude Code at Raidu's Anthropic-compatible endpoint.
export ANTHROPIC_BASE_URL=https://proxy.raidu.com/acme-corp/anthropic
export ANTHROPIC_API_KEY=raidu_xxx # scoped, rotatable, revocable
export RAIDU_POLICY=coding.eng.v7 # per-repo or per-team
claude code
# Every message from the agent now carries:
# x-raidu-policy: coding.eng.v7
# x-raidu-record-id: rec_01JBVX7P9A8Z8PTQJG4K9NDJ4W
# x-raidu-decision: allow | mask | deny | approval-required
# x-raidu-signature: MIIFxjCCA66gAwIBAgI...