Set Up Slack Alerts¶
Get notified in Slack when AgenticAudit detects high-risk events or PII exposure.
Step 1: Create a Slack webhook¶
- Go to Slack App Management
- Create a new app (or use an existing one)
- Enable Incoming Webhooks
- Add a webhook to your target channel
- Copy the webhook URL (starts with
https://hooks.slack.com/services/)
Step 2: Add an alert rule¶
Update your organization policy via the API:
curl -X PUT http://localhost:8000/v1/org/policy \
-H "Authorization: Bearer aa_live_xxxxx" \
-H "Content-Type: application/json" \
-d '{
"alert_rules": [
{
"name": "High risk events",
"condition": {
"risk_level_gte": "high"
},
"notify": {
"slack_webhook_url": "https://hooks.slack.com/services/T.../B.../xxx"
}
}
]
}'
Or configure via the dashboard at http://localhost:8000/dashboard/policy.
Step 3: Test the alert¶
Trigger a high-risk event. For example, log an event with a credential pattern:
curl -X POST http://localhost:8000/v1/events \
-H "Authorization: Bearer aa_live_xxxxx" \
-H "Content-Type: application/json" \
-d '{
"agent_id": "test-agent",
"action": "shell_command",
"data": {"command": "echo sk_live_abc123def456"}
}'
This triggers a critical risk event. Check your Slack channel — you should see a formatted alert with the event details.
Alert message format¶
The Slack message includes:
- Event action and agent ID
- Risk level (color-coded)
- PII detection status
- Matched compliance frameworks
- Timestamp
Multiple alert rules¶
You can configure multiple rules for different channels or conditions:
{
"alert_rules": [
{
"name": "Critical to #security-incidents",
"condition": {
"risk_level_gte": "critical"
},
"notify": {
"slack_webhook_url": "https://hooks.slack.com/services/.../security"
}
},
{
"name": "PII events to #compliance",
"condition": {
"pii_detected": true
},
"notify": {
"slack_webhook_url": "https://hooks.slack.com/services/.../compliance"
}
},
{
"name": "Production shell commands to #devops",
"condition": {
"action_contains": "shell_command",
"risk_level_gte": "high"
},
"notify": {
"slack_webhook_url": "https://hooks.slack.com/services/.../devops"
}
}
]
}
Condition reference¶
All conditions use AND logic — every specified condition must match for the alert to fire.
| Condition | Type | Example |
|---|---|---|
risk_level_gte | string | "high" — matches high and critical |
action_contains | string | "shell" — matches shell_command |
pii_detected | bool | true — only PII events |
agent_id_eq | string | "claude-code" — only this agent |
Next steps¶
- Configure paranoid mode — block risky actions, not just alert
- Policy system — full policy reference