YesPaPa
YesPaPa is a TOTP-authenticated command gateway that intercepts dangerous shell commands and routes approval to a human via mobile app or any standard TOTP authenticator (Google Authenticator, Authy, 1Password). It prevents LLM agents or scripts from executing destructive operations without human consent.Two-Ring Architecture
Inner Ring
Offline TOTP gate for shell commands. Works with any RFC 6238 authenticator app. Zero infrastructure required.
Outer Ring
YesPaPa mobile app adds push notifications, one-tap approve/deny, and approve-with-message for agent feedback.
How It Works
- An agent or user runs a dangerous command (e.g.,
rm -rf ./dist) - YesPaPa intercepts the command via shell aliases
- The daemon prompts for a TOTP code in the terminal and/or pushes to your phone
- You approve or deny from your authenticator app or the YesPaPa mobile app
- Approved commands execute normally; denied commands are blocked
Key Features
- Shell interception — Aliases dangerous commands to route through the approval gate
- TOTP authentication — Works with any standard authenticator app
- Tamper detection — Re-injects shell aliases if an agent removes them
- Uninstall protection — Agents cannot remove their own guardrails
- Push notifications — Get notified on your phone when commands are intercepted
- Approve with message — Send feedback to AI agents along with your approval
- Grace periods — Temporarily skip TOTP prompts for trusted scopes
- Self-hostable — Run your own remote server with Docker or Supabase