Hooks

Run shell commands at various points during agent execution for deterministic control over behavior.

Overview

Hooks allow you to execute shell commands or scripts at key points in an agent’s lifecycle. They provide deterministic control that works alongside the LLM’s behavior, enabling validation, logging, environment setup, and more.

ℹ️ Use Cases
  • Validate or transform tool inputs before execution
  • Log all tool calls to an audit file
  • Block dangerous operations based on custom rules
  • Validate, redact, or enrich user prompts before they reach the model
  • Programmatically approve or deny tool calls without prompting the user
  • Steer or veto context-window compaction
  • Audit sub-agent handoffs in multi-agent setups
  • Set up the environment when a session starts
  • Clean up resources when a session ends
  • Log or validate model responses before returning to the user
  • Send external notifications on agent errors or warnings

Hook Types

docker-agent dispatches the following hook events:

Event When it fires Can block?
pre_tool_use Before a tool call executes Yes
tool_response_transform Between a tool’s execution and the runtime’s emission/record of the response No
post_tool_use After a tool completes — fires for both success and failure Yes
permission_request Just before the runtime would prompt the user to approve a tool Yes
session_start When a session begins or resumes No
user_prompt_submit Once per user message, after submission and before the model runs Yes
turn_start At the start of every agent turn (each model call) No
turn_end At the end of every agent turn — fires no matter why the turn ended No
before_llm_call Just before every model call (after turn_start) Yes
after_llm_call After every successful model call, before the response is recorded No
session_end When a session terminates No
pre_compact Just before the runtime compacts the session transcript Yes
before_compaction Just before a compaction runs — can veto or supply a custom summary Yes
after_compaction After a successful compaction (summary applied to the session) No
subagent_stop When a sub-agent (transferred task / background / skill sub-session) finishes No
on_user_input When the agent is waiting for user input No
stop When the model finishes responding No
notification When the agent emits a notification (error or warning) No
on_error When the runtime hits an error during a turn (fires alongside notification) No
on_max_iterations When the runtime reaches its configured max_iterations limit No
on_agent_switch When the runtime moves the active agent (transfer_task, handoff, return) No
on_session_resume When the user explicitly approves continuation past max_iterations No
on_tool_approval_decision After the runtime’s approval chain (yolo / permissions / readonly / ask) resolves No
ℹ️ Two compaction events

pre_compact and before_compaction both fire just before a compaction. pre_compact is the original event and is best-suited to steering the LLM-generated summary by appending guidance via additional_context. before_compaction is the newer, structured event: it carries the input/output token counts, the model's context limit, and a compaction_reason so handlers can decide based on real session pressure, and it can replace the LLM-generated summary verbatim via hook_specific_output.summary.

Configuration

agents:
  root:
    model: openai/gpt-4o
    description: An agent with hooks
    instruction: You are a helpful assistant.
    hooks:
      # Run before specific tools
      pre_tool_use:
        - matcher: "shell|edit_file"
          hooks:
            - type: command
              command: "./scripts/validate-command.sh"
              timeout: 30

      # Run after all tool calls
      post_tool_use:
        - matcher: "*"
          hooks:
            - type: command
              command: "./scripts/log-tool-call.sh"

      # Run when session starts
      session_start:
        - type: command
          command: "./scripts/setup-env.sh"

      # Run when session ends
      session_end:
        - type: command
          command: "./scripts/cleanup.sh"

      # Run when agent is waiting for user input
      on_user_input:
        - type: command
          command: "./scripts/notify.sh"

      # Run when the model finishes responding
      stop:
        - type: command
          command: "./scripts/log-response.sh"

      # Run on agent errors and warnings
      notification:
        - type: command
          command: "./scripts/alert.sh"

Built-in Hooks

In addition to shell command hooks, docker-agent ships a small library of built-in hooks — in-process Go functions that run without spawning a subprocess. They’re invoked with type: builtin, where command is the builtin’s registered name and args are passed through as the builtin’s parameters.

hooks:
  turn_start:
    - type: builtin
      command: add_date
    - type: builtin
      command: add_prompt_files
      args:
        - GUIDELINES.md
        - PROJECT.md
  session_start:
    - type: builtin
      command: add_environment_info
  before_llm_call:
    - type: builtin
      command: max_iterations
      args: ["50"]

Built-ins are typically zero-config and faster than equivalent shell hooks because they don’t fork a process. They cover the common “inject context into every turn / session” patterns out of the box.

Available built-ins

Builtin Event Args What it does
add_date turn_start none Prepends Today's date: YYYY-MM-DD so the model always knows the current date.
add_environment_info session_start none Adds the working directory, git-repo status, OS, and CPU architecture.
add_prompt_files turn_start [file1, file2, ...] Reads each named file from the workdir hierarchy (walking up) and the home directory, and appends their contents.
add_git_status turn_start none Adds the output of git status --short --branch (no-op outside a git repo or when git isn’t installed).
add_git_diff turn_start none, or ["full"] Adds git diff --stat by default. Pass args: ["full"] to emit the full unified diff. Output is capped to 4 KB.
add_directory_listing session_start none Adds an alphabetical listing of the cwd’s top-level entries (skips dot-files, capped at 100 with a “… and N more”).
add_user_info session_start none Adds the current OS user (username and full name) and the hostname.
add_recent_commits session_start none, or ["<N>"] Adds git log --oneline -n N. N defaults to 10; pass a positive integer to override.
max_iterations before_llm_call ["<N>"] (required) Hard-stops the agent after N model calls. Stateless: the runtime supplies the iteration counter on every dispatch.
snapshot session_start, turn_start, turn_end, pre_tool_use, post_tool_use, session_end none Records filesystem snapshots in a shadow git repo under the docker-agent data directory. No-op outside git repos; respects the source repo’s ignore rules and skips newly-added files larger than 2 MiB.
redact_secrets pre_tool_use, before_llm_call, tool_response_transform none Scrubs detected secrets (API keys, tokens, private keys, …) out of tool call arguments, outgoing chat content, and tool output. The same builtin handles all three events and dispatches on the event name. Auto-registered on all three events by redact_secrets: true on the agent — see examples/redact_secrets_hooks.yaml for the manual wiring.
unload on_agent_switch none Walks the previous agent’s models and calls Unload() on every provider that implements provider.Unloader — typically Docker Model Runner — to free the GPU/RAM the just-departing model was holding. Cloud-only providers don’t implement the interface and are silently skipped. Errors are logged and swallowed; agent switching never blocks on a slow or unreachable engine (each Unload call has a 10 s timeout). See examples/unload_on_switch.yaml.
ℹ️ Per-turn vs. per-session

turn_start built-ins recompute every turn and contribute transient context that is not persisted to the session — perfect for fast-moving signals like the date or current git state. session_start built-ins run once per session and their context persists across turns and resumes — pick this for stable context like the OS user or the initial directory listing.

ℹ️ Auto-injected built-ins

The agent flags add_date: true, add_environment_info: true, add_prompt_files: [...], and redact_secrets: true are shorthands that auto-register the matching built-in hook. You don't need to repeat them under hooks: — set the flag or the hook entry(ies), not both. redact_secrets: true auto-registers the same builtin on all three of pre_tool_use, before_llm_call, and tool_response_transform; you can also wire any subset of them by hand for finer-grained control (per-tool matchers, ordering with other rewriters, …).

A minimal snapshot wiring looks like this:

hooks:
  turn_start:
    - type: builtin
      command: snapshot
  turn_end:
    - type: builtin
      command: snapshot
  session_end:
    - type: builtin
      command: snapshot

The shadow repository stores tree objects only; it never writes commits or touches the source repository’s .git directory. The source repository’s .gitignore and info/exclude rules are mirrored before each capture so ignored files do not appear in snapshots. The built-in only records undo checkpoints when files changed, so a final no-op model response does not hide the last changed snapshot.

You can also enable snapshots globally for every agent with user config:

settings:
  snapshot: true

Omit snapshot or set it to false to leave automatic snapshots off; manually configured snapshot hooks still run.

⚠️ Two flavors of max_iterations

The max_iterations agent field has its own UX (it pauses and asks the user to resume past the limit). The max_iterations built-in hook is a hard stop with no resume — when its counter trips, the agent terminates with a block decision. Use the agent field for interactive sessions and the built-in hook to enforce non-negotiable caps in unattended runs.

Matcher Patterns

The matcher field uses regex patterns to match tool names:

Pattern Matches
* All tools
shell Only the shell tool
shell\|edit_file Either shell or edit_file
mcp:.* All MCP tools (regex)

Hook Input

Hooks receive JSON input via stdin with context about the event:

{
  "session_id": "abc123",
  "cwd": "/path/to/project",
  "hook_event_name": "pre_tool_use",
  "tool_name": "shell",
  "tool_use_id": "call_xyz",
  "tool_input": {
    "cmd": "rm -rf /tmp/cache",
    "cwd": "."
  }
}

Common Fields

Every hook event carries:

Field Description
session_id The current session’s ID.
cwd The runtime’s working directory.
hook_event_name The event name (e.g. pre_tool_use).

Per-Event Extra Fields

In addition to the common fields, each event ships its own payload:

Event Extra fields
pre_tool_use tool_name, tool_use_id, tool_input
tool_response_transform tool_name, tool_use_id, tool_input, tool_response
post_tool_use tool_name, tool_use_id, tool_input, tool_response, tool_error
permission_request tool_name, tool_use_id, tool_input
session_start source — one of startup, resume, clear, compact
user_prompt_submit prompt — the text the user just submitted
turn_start none (just the common fields)
turn_end agent_name, reason — one of normal, continue, steered, error, canceled, hook_blocked, loop_detected
before_llm_call iteration — 1-based run-loop iteration counter (the model call this hook is gating)
after_llm_call agent_name, stop_response, last_user_message
session_end reason — one of clear, logout, prompt_input_exit, other
pre_compact source — one of manual, auto, overflow, tool_overflow
before_compaction input_tokens, output_tokens, context_limit, compaction_reason (one of threshold/overflow/manual)
after_compaction input_tokens, output_tokens, context_limit, compaction_reason, summary
subagent_stop agent_name (the sub-agent), parent_session_id, stop_response
on_user_input none
stop agent_name, stop_response, last_user_message
notification notification_level (error or warning), notification_message
on_error notification_level (always error), notification_message
on_max_iterations notification_level (always warning), notification_message
on_agent_switch from_agent, to_agent, agent_switch_kind (transfer_task, transfer_task_return, or handoff)
on_session_resume previous_max_iterations, new_max_iterations
on_tool_approval_decision tool_name, tool_use_id, tool_input, approval_decision, approval_source

Notes:

Hook Output

Hooks communicate back via JSON output to stdout:

{
  "continue": true,
  "stop_reason": "Optional message when continue=false",
  "suppress_output": false,
  "system_message": "Warning message to show user",
  "decision": "block",
  "reason": "Explanation for the decision",
  "hook_specific_output": {
    "hook_event_name": "pre_tool_use",
    "permission_decision": "allow",
    "permission_decision_reason": "Command is safe",
    "updated_input": { "cmd": "modified command" }
  }
}

All fields are optional. Returning {} (or no output at all) means “do nothing, continue normally”.

Output Fields

Field Type Description
continue boolean Whether to continue execution (default: true)
stop_reason string Message to show when continue=false
suppress_output boolean Hide stdout from transcript
system_message string Warning message to display to user
decision string For blocking: block to prevent operation
reason string Explanation for the decision

Pre-Tool-Use / Permission-Request Specific Output

The hook_specific_output for pre_tool_use (and permission_request) supports:

Field Type Description
permission_decision string allow, deny, or ask
permission_decision_reason string Explanation for the decision
updated_input object Modified tool input (replaces original)

Tool-Response-Transform Specific Output

The hook_specific_output for tool_response_transform supports:

Field Type Description
updated_tool_response string Rewritten tool output (replaces the original)

This is the symmetric counterpart of pre_tool_use’s updated_input, applied to tool results instead of tool arguments. The rewrite reaches every downstream consumer — event subscribers, the persisted session file, the post_tool_use hook input, and the next LLM call. Use it to truncate excessive output, scrub PII, or normalise tool dialects. The built-in redact_secrets registers itself on this event as the third leg of the redact_secrets feature.

Context-Contributing Events

For session_start, user_prompt_submit, turn_start, post_tool_use, pre_compact, and stop, hooks may set hook_specific_output.additional_context to inject text into the conversation. turn_start context is transient (recomputed every turn, never persisted); session_start context persists for the life of the session.

Before-Compaction Specific Output

For before_compaction, the hook_specific_output.summary field, when non-empty, replaces the LLM-generated compaction summary. The runtime applies the string verbatim and skips the model call.

{
  "hook_specific_output": {
    "hook_event_name": "before_compaction",
    "summary": "User asked to refactor pkg/foo. Done in commit abc123."
  }
}

Returning decision: "block" (or exit code 2) instead vetoes the compaction entirely. Be cautious about denying when compaction_reason is overflow: the runtime is recovering from a context-overflow error and a denial there will leave the session unable to make progress.

Plain Text Output

For session_start, user_prompt_submit, turn_start, post_tool_use, pre_compact, and stop hooks, plain text written to stdout (i.e., output that is not valid JSON) is captured as additional context for the agent. For pre_compact it is appended to the compaction prompt; for the others it is spliced into the conversation as a (transient or persisted) system message depending on the event.

Exit Codes

Hook exit codes have special meaning:

Exit Code Meaning
0 Success — continue normally
2 Blocking error — stop the operation
Other Error — logged but execution continues

Per-hook options

Hooks have a default timeout of 60 seconds. You can also give hooks a name, add environment variables, choose a working directory, and control how non-security hook failures behave:

hooks:
  post_tool_use:
    - matcher: "shell"
      hooks:
        - name: "summarize shell output"
          type: command
          command: "./summarize.sh"
          timeout: 120 # 2 minutes
          working_dir: ./hooks
          env:
            PROFILE: dev
          on_error: warn # warn | ignore | block

pre_tool_use is fail-closed for safety: a failed pre-tool hook blocks the tool call regardless of on_error.

⚠️ Performance

Hooks run synchronously and can slow down agent execution. Keep hook scripts fast and efficient. Consider using suppress_output: true for logging hooks to reduce noise.

ℹ️ Session End and Cancellation

session_end hooks are designed to run even when the session is interrupted (e.g., Ctrl+C). They are still subject to their configured timeout.

Examples

Validation Script

A simple pre-tool-use hook that blocks dangerous shell commands:

#!/bin/bash
# scripts/validate-command.sh

# Read JSON input from stdin
INPUT=$(cat)
TOOL_NAME=$(echo "$INPUT" | jq -r '.tool_name')
CMD=$(echo "$INPUT" | jq -r '.tool_input.cmd // empty')

# Block dangerous commands
if [[ "$TOOL_NAME" == "shell" ]]; then
  if [[ "$CMD" =~ ^sudo ]] || [[ "$CMD" =~ rm.*-rf ]]; then
    echo '{"decision": "block", "reason": "Dangerous command blocked by policy"}'
    exit 2
  fi
fi

# Allow everything else (returning {} means "do nothing, continue normally")
echo '{}'
exit 0

Audit Logging

A post-tool-use hook that logs all tool calls:

#!/bin/bash
# scripts/log-tool-call.sh

INPUT=$(cat)
TIMESTAMP=$(date -u +"%Y-%m-%dT%H:%M:%SZ")
TOOL_NAME=$(echo "$INPUT" | jq -r '.tool_name')
SESSION_ID=$(echo "$INPUT" | jq -r '.session_id')

# Append to audit log
echo "$TIMESTAMP | $SESSION_ID | $TOOL_NAME" >> ./audit.log

# Don't block execution
echo '{"continue": true}'
exit 0

Session Lifecycle

Session start and end hooks for environment setup and cleanup:

hooks:
  session_start:
    - type: command
      timeout: 10
      command: |
        INPUT=$(cat)
        SESSION_ID=$(echo "$INPUT" | jq -r '.session_id // "unknown"')
        echo "Session $SESSION_ID started at $(date)" >> /tmp/agent-session.log
        echo '{"hook_specific_output":{"additional_context":"Session initialized."}}'

  session_end:
    - type: command
      timeout: 10
      command: |
        INPUT=$(cat)
        SESSION_ID=$(echo "$INPUT" | jq -r '.session_id // "unknown"')
        REASON=$(echo "$INPUT" | jq -r '.reason // "unknown"')
        echo "Session $SESSION_ID ended ($REASON) at $(date)" >> /tmp/agent-session.log

Response Logging with Stop Hook

Log every model response for analytics or compliance:

hooks:
  stop:
    - type: command
      timeout: 10
      command: |
        INPUT=$(cat)
        SESSION_ID=$(echo "$INPUT" | jq -r '.session_id // "unknown"')
        RESPONSE_LENGTH=$(echo "$INPUT" | jq -r '.stop_response // ""' | wc -c | tr -d ' ')
        echo "[$(date)] Session $SESSION_ID - Response: $RESPONSE_LENGTH chars" >> /tmp/agent-responses.log

The stop hook is useful for:

Error Notifications

Send alerts when the agent encounters errors:

hooks:
  notification:
    - type: command
      timeout: 10
      command: |
        INPUT=$(cat)
        LEVEL=$(echo "$INPUT" | jq -r '.notification_level // "unknown"')
        MESSAGE=$(echo "$INPUT" | jq -r '.notification_message // "no message"')
        echo "[$(date)] [$LEVEL] $MESSAGE" >> /tmp/agent-notifications.log

The notification hook fires when:

Use on_error and on_max_iterations instead of notification when you want a structured handler for one of these conditions without parsing notification_level.

Turn-Start: per-turn context

turn_start fires at the start of every agent turn (each model call). Anything you contribute via additional_context (or plain stdout) is appended as a transient system message for that turn only — it is not persisted to the session. Use it for fast-moving signals like the date, current git state, or per-turn prompt files. The built-in hooks add_date, add_prompt_files, add_git_status, and add_git_diff all target this event.

Turn-End: per-turn finalizer

turn_end is the symmetric counterpart of turn_start. It fires once per turn when the iteration finishes — no matter why. The runtime guarantees the dispatch on every exit path (a normal stop, an error, a hook-driven shutdown, the loop detector, even context cancellation), and it uses context.WithoutCancel internally so handlers run to completion on Ctrl+C.

The reason field classifies the exit:

reason When
normal Model finished cleanly with no follow-up
continue More iterations to come (e.g. tool calls, follow-up message)
steered Drained steered messages prompted a re-entry
error Model call failed (handleStreamError exited the loop)
canceled Context was cancelled (e.g. Ctrl+C)
hook_blocked before_llm_call or post_tool_use denied the call
loop_detected The consecutive-tool-call loop detector terminated the turn

turn_end is observational — the result is ignored. Use it to time turns, accumulate per-turn metrics (token usage, tool counts), or notify external observability pipelines symmetrically with turn_start.

Before/After-LLM-Call: budget guards and model auditing

before_llm_call fires immediately before every model call (after turn_start has assembled the messages). It cannot contribute context — use turn_start for that — but it can stop the run by returning decision: block (or exit code 2). The built-in max_iterations hook implements a hard cap on top of this event.

after_llm_call fires immediately after each successful model call, before the response is recorded into the session and tool calls are dispatched. The assistant text is in stop_response. Use it for response auditing, redaction logging, or quality metrics. Failed model calls fire on_error instead.

Before/After-Compaction: structured compaction control

before_compaction fires immediately before a compaction. Unlike pre_compact, it carries structured token-pressure data: input_tokens, output_tokens, context_limit, and a compaction_reason (threshold, overflow, or manual). Hooks can either:

after_compaction fires after a successful compaction. It carries the produced summary along with the pre-compaction input_tokens / output_tokens so observability handlers can naturally express “compacted from X to Y”. after_compaction is purely observational; output is ignored.

Agent-Switch and Session-Resume: observability for multi-agent and long runs

on_agent_switch fires whenever the runtime moves the active agent to a new one — transfer_task, handoff, or the return after a transferred task completes. The cause is in agent_switch_kind, the source and destination in from_agent and to_agent. Use it for audit, transcript, and metrics pipelines that track which agent ran which tools.

The built-in unload hooks into this event to release the resources held by the previous agent’s models. It’s the canonical way to run two heavy local models on a GPU that can only fit one at a time:

agents:
  coder:
    model: qwen3-large
    handoffs: [reviewer]
    hooks:
      on_agent_switch:
        - type: builtin
          command: unload
  reviewer:
    model: qwen3-coder
    handoffs: [coder]
    hooks:
      on_agent_switch:
        - type: builtin
          command: unload

models:
  qwen3-large:
    provider: dmr
    model: ai/qwen3-large
  qwen3-coder:
    provider: dmr
    model: ai/qwen3-coder

At every transfer the runtime calls Unload() on the previous agent’s model providers. For Docker Model Runner this hits the engine’s _unload endpoint; for cloud providers (OpenAI, Anthropic, …) it is a silent no-op. Cross-provider chains are safe — only the providers that actually implement provider.Unloader are touched. See examples/unload_on_switch.yaml for the full file.

on_session_resume fires when the user explicitly approves the runtime to continue past its configured max_iterations limit. previous_max_iterations carries the cap that was reached and new_max_iterations carries the new cap after approval. Useful for alerting on extended-runtime sessions or for billing / quota pipelines that meter resumes.

Tool-Approval-Decision: who-approved-what audit trail

on_tool_approval_decision fires after the runtime’s tool-approval chain (yolo / permissions / readonly / pre_tool_use hooks / interactive prompt) has resolved a verdict for a tool call. approval_decision is allow, deny, or canceled; approval_source is a stable classifier of which step produced the verdict. Observational only — it gives audit pipelines a single, structured “who approved what” record without re-implementing the chain.

Pre-Compact: steer the summary

pre_compact fires just before the runtime compacts the session transcript. Its source field tells you why compaction was triggered:

Return additional_context (or plain stdout) to append guidance to the compaction prompt without modifying the agent’s instruction. Block the event (decision: block / exit code 2) to cancel compaction — useful when you want to handle truncation yourself.

User-Prompt-Submit: gate or enrich every user message

user_prompt_submit fires once per user message, after the prompt is recorded in the session and before the first model call. The submitted text is in prompt. Use it to:

It does not fire for sub-sessions (transferred tasks, background agents, skill sub-sessions) because their kick-off message is synthesised by the runtime.

Subagent-Stop: observe handoff completions

subagent_stop fires whenever a sub-agent finishes — transfer_task returns, a background agent completes, or a skill sub-session ends. It runs against the parent agent’s hooks executor, so handlers configured on the orchestrator see every child completion in one place. The sub-agent’s name is in agent_name, the parent’s session ID in parent_session_id, and the child’s final assistant message in stop_response.

Permission-Request: programmatic tool approval

permission_request fires just before the runtime would prompt the user to approve a tool call (i.e. when neither --yolo nor a permissions rule short-circuited the decision and the tool is not read-only). Use the same hook_specific_output.permission_decision shape as pre_tool_use to auto-approve or auto-deny the call:

hooks:
  permission_request:
    - matcher: "shell"
      hooks:
        - type: command
          command: |
            INPUT=$(cat)
            CMD=$(echo "$INPUT" | jq -r '.tool_input.cmd // ""')
            if echo "$CMD" | grep -qE '^(ls|pwd|cat) '; then
              echo '{"hook_specific_output":{"permission_decision":"allow","permission_decision_reason":"safe read-only command"}}'
            fi

Return nothing to fall through to the usual interactive confirmation.

LLM as a Judge (Auto-Approving Tool Calls)

The model hook type asks an LLM and translates its reply into the hook’s native output — no Go code, no shell glue, no JSON parsing on your side. Combined with the well-known pre_tool_use_decision schema it gives you a fully-configurable LLM judge that decides allow / ask / deny per tool call.

hooks:
  pre_tool_use:
    - matcher: "shell|edit_file|mcp:.*"
      hooks:
        - type: model
          model: openai/gpt-4o-mini
          timeout: 15
          schema: pre_tool_use_decision
          prompt: |
            You are a security judge for an autonomous agent.
            Decide whether this tool call is safe to auto-approve.

            Tool: 
            Args: 

            Project rules:
            - Reads under the working directory are safe.
            - Writes to ~/.ssh / ~/.aws / ~/.docker are deny.
Field Required Description
model yes Model spec (provider/model, e.g. openai/gpt-4o-mini). The judge model — small/cheap is recommended.
prompt yes Go text/template body. Sees the hook Input as data, plus the toJSON and truncate <n> helpers.
schema no Well-known response interpretation. pre_tool_use_decision produces a permission_decision verdict; omit for free-form text injected as additional_context.
timeout no (default 60s) Per-call timeout. Timeouts fail closed (deny) for pre_tool_use regardless of any other setting. Match it to your judge model’s typical latency plus a small buffer.

The pre_tool_use_decision schema constrains the judge to reply with strict {decision, reason} JSON. Providers that honor structured output (OpenAI, …) are asked to emit that shape directly; on providers that ignore it the framework still parses tolerant JSON-in-text. Anything unparseable propagates as a hook error and the executor falls closed (deny) on pre_tool_use.

Pair it with deterministic permissions: rules so destructive calls (e.g. sudo, rm -rf) are blocked even if the judge is misled, and obvious read-only calls bypass the LLM entirely. See examples/llm_judge.yaml for a complete configuration.

Security considerations:

CLI Flags

You can add hooks from the command line without modifying the agent’s YAML file. This is useful for one-off debugging, audit logging, or layering hooks onto an existing agent.

Flag Description
--hook-pre-tool-use Run a command before every tool call
--hook-post-tool-use Run a command after every tool call
--hook-session-start Run a command when a session starts
--hook-session-end Run a command when a session ends
--hook-on-user-input Run a command when waiting for input
--hook-stop Run a command when the model finishes responding

All flags are repeatable — pass multiple to register multiple hooks.

# Add a session-start hook
$ docker agent run agent.yaml --hook-session-start "./scripts/setup-env.sh"

# Combine multiple hooks
$ docker agent run agent.yaml \
  --hook-pre-tool-use "./scripts/validate.sh" \
  --hook-post-tool-use "./scripts/log.sh"

# Add hooks to an agent from a registry
$ docker agent run agentcatalog/coder \
  --hook-pre-tool-use "./audit.sh"
ℹ️ Merging behavior

CLI hooks are appended to any hooks already defined in the agent's YAML config. They don't replace existing hooks. Pre/post-tool-use hooks added via CLI match all tools (equivalent to matcher: "*").