Skip to content

Create documentation for Omega Walls integration#462

Open
anviren wants to merge 1 commit intodeepset-ai:mainfrom
anviren:main
Open

Create documentation for Omega Walls integration#462
anviren wants to merge 1 commit intodeepset-ai:mainfrom
anviren:main

Conversation

@anviren
Copy link
Copy Markdown

@anviren anviren commented Apr 28, 2026

This PR adds Omega Walls to the Haystack integrations index.

Omega Walls is an open-source runtime trust boundary for RAG and AI agent pipelines.

It includes a Haystack adapter, OmegaHaystackGuard, that can wrap a Haystack pipeline and guard tool calls before execution.

Use case:
Haystack pipelines often ingest external or semi-trusted content such as documents, PDFs, web pages, support tickets, knowledge base articles, or tool outputs. In LLM-powered workflows, that content is meant to be data, but it can still influence the model context and downstream tool behavior.

Omega Walls helps separate untrusted content from control flow by adding checks around:

  • model/input flow
  • tool calls before execution
  • memory-write candidates
  • cross-document or cross-step prompt-injection pressure
  • secret-exfiltration pressure
  • tool/action abuse

Install:
pip install "omega-walls[integrations]"

Haystack example:

from omega.integrations import OmegaHaystackGuard

guard = OmegaHaystackGuard(profile="quickstart")

pipeline = guard.wrap_pipeline(
    pipeline,
    component_name="omega_guard_component",
)

safe_tool = guard.wrap_tool("network_post", network_post_fn)

Links:
GitHub: https://github.com/synqratech/omega-walls
PyPI: https://pypi.org/project/omega-walls/

This PR adds Omega Walls to the Haystack integrations index.

Omega Walls is an open-source runtime trust boundary for RAG and AI agent pipelines.

It includes a Haystack adapter, `OmegaHaystackGuard`, that can wrap a Haystack pipeline and guard tool calls before execution.

Use case:
Haystack pipelines often ingest external or semi-trusted content such as documents, PDFs, web pages, support tickets, knowledge base articles, or tool outputs. In LLM-powered workflows, that content is meant to be data, but it can still influence the model context and downstream tool behavior.

Omega Walls helps separate untrusted content from control flow by adding checks around:

- model/input flow
- tool calls before execution
- memory-write candidates
- cross-document or cross-step prompt-injection pressure
- secret-exfiltration pressure
- tool/action abuse

Install:
pip install "omega-walls[integrations]"

Haystack example:

from omega.integrations import OmegaHaystackGuard

guard = OmegaHaystackGuard(profile="quickstart")

pipeline = guard.wrap_pipeline(
    pipeline,
    component_name="omega_guard_component",
)

safe_tool = guard.wrap_tool("network_post", network_post_fn)

Links:
GitHub: https://github.com/synqratech/omega-walls
PyPI: https://pypi.org/project/omega-walls/
@anviren anviren requested a review from a team as a code owner April 28, 2026 11:14
Copy link
Copy Markdown
Contributor

@bilgeyucel bilgeyucel left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for the PR @anviren! I left some comments. Feel free to add a logo for the integration as well

Comment on lines +66 to +71
pipeline = guard.wrap_pipeline(
pipeline,
component_name="omega_guard_component",
)

safe_tool = guard.wrap_tool("network_post", network_post_fn)
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can I then use the pipeline/the tool as usual? What's the process after this step?

Comment on lines +74 to +105
### What it checks

Omega Walls is designed to check:

* model/input flow
* tool calls before execution
* memory-write candidates
* cross-document or cross-step prompt-injection pressure
* secret-exfiltration pressure
* tool/action abuse

When a risky input or tool call is detected, the guard can block the step with typed exceptions instead of letting the pipeline continue blindly.

## When to use it

Omega Walls is useful for Haystack users building RAG or agentic workflows over real-world content, especially when the pipeline reads from:

* external documents
* PDFs
* web pages
* support tickets
* user-provided files
* internal knowledge bases
* tool outputs

Typical use cases include:

* internal document assistants
* support-ticket summarizers
* agentic RAG workflows
* pipelines with tool calls
* pipelines that read untrusted or user-provided documents
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can you shorten this section in couple of sentences? Otherwise, it takes too much space

---
layout: integration
name: Omega Walls
description: Runtime trust boundary for Haystack RAG and agent pipelines that ingest untrusted content.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
description: Runtime trust boundary for Haystack RAG and agent pipelines that ingest untrusted content.
description: Runtime trust boundary for ingested content in Haystack applications

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants