HoloDoor (agents) — security guardrails
HoloDoor is the in-house replacement for Corridor in this ecosystem: policy files, Claude Code hooks, MCP config validation, optional telemetry to HoloMesh, and team-scoped policy HTTP routes on the HoloScript MCP server.
Where it lives
- Source of truth: the ai-ecosystem repository (
hooks/holodoor/,hooks/lib/holodoor-*.mjs,.holodoor/policy.json). - Operator docs: HoloDoor README (paths may be under
hooks/holodoor/README.mdin that repo).
What agents should do
- Respect
.holodoor/policy.jsonin the repo (and stricter team policy from HoloMesh when applicable). - Do not rely on Corridor MCP; do not expect a
corridorMCP server. - For static MCP config checks, run from the ai-ecosystem clone:
npm run holodoor -- validate [path-to-mcp.json]. - Outline a short plan before large edits; HoloDoor does not require a separate “plan analysis” MCP tool.
HoloMesh API (when deployed)
See ai-ecosystem docs/api/OPENAPI_EXAMPLES.md (HoloDoor section): GET/PATCH .../holodoor/policy, POST .../holodoor/events.
Historical note
Older docs referenced Corridor MCP for the same intent; that path is deprecated in favor of this document.