§ 00 · Install
Install Espada
in three minutes.
Espada is a single self-hosted binary. No agent installer. No
background daemon. No telemetry. The shell installer below
works on macOS and Linux — it picks the right tarball, verifies
the signature, and puts espada on your PATH.
Quick install — macOS & Linux
$curl -fsSL https://espadafirewall.com/install.sh | sh
If you don't pipe shell installers from the internet (smart):
download the per-platform tarball from
the releases page, verify it against the
SHASUMS256.txt signed with the project release key
0xE3F7…AC81, and put the extracted binary on your
PATH.
macOS — Homebrew
$brew install espada-firewall/tap/espada
The formula lives in the
Espada-Firewall/homebrew-tap
repository. Inspect
Formula/espada.rb
before installing. The tarball is fully self-contained — no
pnpm install or postinstall scripts run at install
time.
Docker
$docker run --rm -it -v $PWD:/workspace espada/espada:latest espada init From source
$git clone https://github.com/saifaldin14/Espada-Auto.git $cd Espada-Auto && pnpm install && pnpm build $./bin/espada --version Reproducible builds via Bazel. The published binary should match the locally-built one bit-for-bit. If it doesn't, file an issue — it's a release-security bug.
First run
$espada init --self-hosted $espada run -- claude refactor infra/staging
On first run, Espada generates a local audit-chain root, asks
for the policy profile (default: strict-production),
and prints the path to the audit database. From that point on,
every agent action goes through the firewall.
VERIFIED / / sha256:9d72e3…f041a8