Requires Enterprise plan. Currently in early access behind a feature flag.
- Blocking known-risky or unauthorized tools in sensitive environments
- Enforcing software supply chain policies
Configuration
- Go to Settings → Organization → Policies
- Toggle Enable Executable Deny List
- Enter executable paths, one per line (maximum 20 entries)
- Click Save Changes
/usr/bin/example).
Preview before saving
Test your deny list against a running environment before committing the policy org-wide:- Enter executables in the textarea (saving is not required)
- Click the Preview in… dropdown and select a running environment
- The config is applied immediately to that environment only
- Open the environment to verify the expected binaries are blocked
- Modify the list and re-apply as needed — a warning indicator appears when the textarea changes after a preview
Effect on environments
- New environments receive the deny list on creation
- Restarted environments receive the latest deny list on start
- Already-running environments are not affected by org policy changes — they keep the deny list they received at start time
Limitations
- Maximum 20 entries per deny list
- Blocking a script interpreter (e.g.,
/bin/bash) blocks all scripts that use it, not individual scripts