awf-debug-tools
AWF Debug Tools
A collection of practical Python scripts that help agents efficiently debug and operate the awf firewall. These scripts reduce verbose Docker/log output by 80%+ and provide actionable insights instead of raw data dumps.
Why These Scripts?
Problem: Docker commands and log files are verbose and hard for agents to parse. Diagnosing issues requires 10+ manual commands and produces noisy output that wastes tokens.
Solution: One script replaces 5-10 manual commands with clean, filtered output optimized for agent consumption. All scripts support JSON format for easy parsing.
Available Scripts
All scripts are located in .claude/skills/awf-debug-tools/scripts/:
- parse-squid-logs.py - Parse Squid logs and extract blocked domains with counts
- diagnose-awf.py - Run automated diagnostic checks on container health and configuration
- inspect-containers.py - Show concise container status without verbose docker output
- test-domain.py - Test if specific domain is reachable through the firewall
More from github/gh-aw-firewall
awf-skill
Use the AWF (Agentic Workflow Firewall) to run commands with network isolation and domain whitelisting. Provides L7 HTTP/HTTPS egress control for AI agents.
12debug-firewall
Debug the AWF firewall by inspecting Docker containers (awf-squid, awf-agent), analyzing Squid access logs, checking iptables rules, and troubleshooting blocked domains or network issues.
4debugging-workflows
Debug GitHub Actions workflows by downloading logs, analyzing summaries, and understanding how agentic workflows and the AWF firewall work together.
4recompile-workflows
Regenerate and post-process all agentic workflows. Use when gh-aw is updated, workflow .md files change, or when asked to recompile/regenerate workflows.
4