Skip to main content

YesPaPa

YesPaPa is a TOTP-authenticated command gateway that intercepts dangerous shell commands and routes approval to a human via mobile app or any standard TOTP authenticator (Google Authenticator, Authy, 1Password). It prevents LLM agents or scripts from executing destructive operations without human consent.

Two-Ring Architecture

Inner Ring

Offline TOTP gate for shell commands. Works with any RFC 6238 authenticator app. Zero infrastructure required.

Outer Ring

YesPaPa mobile app adds push notifications, one-tap approve/deny, and approve-with-message for agent feedback.

How It Works

  1. An agent or user runs a dangerous command (e.g., rm -rf ./dist)
  2. YesPaPa intercepts the command via shell aliases
  3. The daemon prompts for a TOTP code in the terminal and/or pushes to your phone
  4. You approve or deny from your authenticator app or the YesPaPa mobile app
  5. Approved commands execute normally; denied commands are blocked

Key Features

  • Shell interception — Aliases dangerous commands to route through the approval gate
  • TOTP authentication — Works with any standard authenticator app
  • Tamper detection — Re-injects shell aliases if an agent removes them
  • Uninstall protection — Agents cannot remove their own guardrails
  • Push notifications — Get notified on your phone when commands are intercepted
  • Approve with message — Send feedback to AI agents along with your approval
  • Grace periods — Temporarily skip TOTP prompts for trusted scopes
  • Self-hostable — Run your own remote server with Docker or Supabase

Next Steps