Active mode

Read-only credentials. Ghost-hunter runs the commands itself.

⚠️ Active mode is for sandbox and personal accounts only. For production, use paranoid mode.

In active mode, Ghost-hunter runs gcloud or aws directly using read-only credentials you provide. The 7-layer validator still gates every command — the LLM cannot escape the allowlist.

Setup

pip install 'ghosthunter[gcp]'   # or [aws] or [all]

Drop a config at ~/.ghosthunter/config.toml:

[provider.gcp]
project_id = "my-sandbox-project"
billing_export_table = "my-billing.gcp_billing_export_v1_0123"

[provider.aws]
profile = "ghosthunter-readonly"
region  = "us-east-1"

Authenticate the underlying SDKs the normal way (gcloud auth application-default login, aws sso login, etc).

Run

ghosthunter investigate --active --provider gcp

Ghost-hunter will execute each proposed command itself, capture the output, compress it via Sonnet, and continue the loop without you pasting.

What active mode cannot do

Even with credentials, the validator blocks anything that isn't a read-only describe / get / list / query operation. There is no flag to disable the validator. If you want a command that isn't in the allowlist, open an issue.

Audit log

Every command Ghost-hunter runs in active mode is appended to ~/.ghosthunter/audit.log. See audit mode to review past investigations.