drako command not covered on dedicated pages.
drako upgrade
drako upgrade
Upgrade the governance enforcement level of an existing What changes per level:
After upgrading, run
.drako.yaml without running drako init again.Upgrade to the
balanced level. Enables DLP enforce, ODD enforce, and HITL reject-on-timeout.Upgrade to the
strict level. Enables all balanced changes plus intent verification (with anti-replay), cryptographic audit trail with 90-day retention, and magnitude enforcement.Path to the config file to upgrade.
Skip the confirmation prompt.
| Feature | balanced | strict |
|---|---|---|
| DLP | audit → enforce | → enforce |
| ODD | audit → enforce | → enforce |
| HITL timeout | allow → reject | → enforce + reject |
| Intent verification | — | → enforce + anti-replay |
| Audit | — | → cryptographic, 90-day retention |
| Magnitude | — | → enforce |
drako push to sync the new config to the platform.drako baseline
drako baseline
Manage the scan baseline used to filter previously-acknowledged findings from Output includes the baseline version, creation timestamp, Drako version, and a breakdown of baselined findings by severity.Both subcommands accept an optional
drako scan output.The baseline is stored in .drako/.baseline.json and is gitignored automatically.Subcommands
drako baseline show [DIRECTORY]Display a summary of the current baseline.drako baseline reset [DIRECTORY]Delete the baseline file. The next drako scan will show all findings.DIRECTORY argument (default: .).To create a baseline, use
drako scan . --baseline rather than drako baseline.drako history
drako history
Show the policy version history for your tenant on the Drako platform.Each row shows the version number, creation timestamp, and change summary.Requires
Path to
.drako.yaml. When omitted, Drako searches the current directory.Maximum number of versions to display.
drako push to have been run at least once.drako diff
drako diff
Compare two policy versions side by side. Requires a Pro plan.Arguments accept version numbers with or without a The output groups changes into added, removed, and modified entries with colour coding.
v prefix (e.g. v3 or 3).Path to
.drako.yaml.drako rollback
drako rollback
drako fix
drako fix
Automatically apply patches for findings that have an available fix snippet.The command scans the project, identifies findings with a
PATH defaults to ..Preview diffs without modifying any files. Prints a unified diff for each fixable finding.
Comma-separated list of frameworks to detect (e.g.
crewai,langgraph).fix_snippet, and replaces the matching code_snippet in the source file. Findings without an available fix are skipped with a [skip] message.drako validate
drako validate
Validate a
.drako.yaml configuration file. Fully offline — no backend connection required.FILE is a required positional argument pointing to the config file to validate.The command performs these checks in order:- YAML parseability — the file must be valid YAML.
- Schema validation — the document must conform to the Drako Pydantic schema.
- Cross-references — HITL trigger tools, hook agent references, A2A channel agents, and fallback tools must all exist in the declared agents/tools sections.
- Logical consistency — circuit breaker thresholds, HITL trust score values, and DLP/HITL mode combinations are checked for coherence.
- Budget math — daily × 7 vs. weekly, and weekly × 4.33 vs. monthly budget limits are compared.
- High-risk warnings — DLP off,
on_backend_unreachable: allow, write/execute tools without HITL, chaos experiments without approval.
0 = valid (warnings may be printed). Exit code 1 = invalid.drako simulate
drako simulate
Replay historical audit data against a proposed policy change to preview the impact before pushing.The simulation returns counts of decisions that would be blocked, escalated, modified, or allowed under the new policy, plus a breakdown of block reasons.
Path to the
.drako.yaml policy file to simulate. Required.Number of hours of historical audit data to replay against the proposed policy.
API key for authentication. Falls back to the
DRAKO_API_KEY environment variable.Drako backend endpoint. Falls back to the
DRAKO_ENDPOINT environment variable.Output format.
terminal renders Rich tables. json emits raw simulation results.drako templates
drako templates
List and inspect built-in policy templates.
Print all available policy templates with their governance level and description.
Print the full YAML content of a named template.Templates can be applied at init time with
drako templates list
Print all available policy templates with their governance level and description.drako templates show NAME
Print the full YAML content of a named template.drako init --template NAME, or referenced in your config with extends: NAME.drako serve
drako serve
Start a local MCP (Model Context Protocol) compliance server that proxies governance calls to the Drako backend.
Path to the Drako configuration file.
Port for the local MCP server. Only used when
--transport sse is set.MCP transport to use.
stdio— reads from stdin (for use with MCP-compatible hosts)sse— starts an HTTP SSE server on--port
drako status
drako status
Show the status of your Drako integration: config validity, API key, backend connectivity, quota, last scan summary, governance features, and last push.The command performs these checks:
Path to the Drako configuration file.
- Loads and validates the config file
- Resolves and masks the API key
- Tests connectivity to the Drako backend
- Fetches quota usage
- Reads the last cached scan result (up to 24 h old)
- Shows active governance features from the local YAML
- Fetches the last pushed config version
1 if any check fails (missing config, invalid API key, connection error).drako verify
drako verify
Verify the cryptographic integrity of your audit hash chain on the Drako platform.On success, prints the number of entries verified and the current chain head hash. On failure, prints the number of broken links and invalid signatures, then exits with code
Path to the Drako configuration file.
Only verify the last N entries in the chain. When omitted, the entire chain is verified.
1.Cryptographic audit trails require the
strict governance level or the audit.cryptographic: true setting in your config.drako push
drako push
Upload your local Before uploading, the command:
.drako.yaml config to the Drako platform, creating a new policy snapshot version.Path to the config file to push.
Override the endpoint from the config file.
Skip the confirmation prompt.
- Validates that the YAML is parseable
- Strips the
api_keyfield from the payload (security) - Shows a summary: agent count, tool count, DLP mode, circuit breaker status