Security
Vault
Grant the minimum autonomy an agent needs, instrument the rest — microVM and WASM paths, crypto-aligned identity, and structured events for review.
Deep dive
“Vault” here is the security posture for autonomous software: least agency, strong isolation, cryptographic identity where the mesh meets the internet, and evidence that auditors can follow. It is not a single product box — it is how Pilox stacks defenses from the kernel boundary up through prompts and policies.
Isolation and blast radius
MicroVMs shrink blast radius per agent when the platform can allocate a VM. WASM paths trade some of that for density and start-up time. Capability-style tokens (roadmap) aim to ensure each agent receives only the permissions its task requires, not a superset of org-wide keys.
Identity and encryption
SPIFFE / SPIRE integration is planned for workload identity and mTLS-oriented meshes. On the hardened A2A SDK path, Noise Protocol E2E gives forward-secrecy-oriented designs between agents. Effectiveness always depends on how you deploy and rotate credentials.
Prompt and content safety
Layered defenses include schema enforcement, LLM Guard, LlamaFirewall, and NeMo Guardrails-class tooling. None of these replace human review of high-risk flows; they reduce naive injection and unsafe tool invocation when configured with your policies.
Audit and evidence
Hash-chained events in PostgreSQL and optional Sigstore Rekor anchoring are directional for immutable audit trails. The objective is defensible logs: what ran, who attested it, and how integrity is verified externally.
Related documentation
Security
Security posture
Least-agency for automated workloads: grant the minimum autonomy an agent needs, instrument the rest.
Least agency
Agents receive no latent permissions by default. Access is ephemeral, scoped, and verified each cycle — the core posture for anything that runs unsupervised on your estate.
Hardware root of trust
Identity and workload attestation align with how you already bind trust: TPM / Secure Enclave paths, SPIFFE-ready meshes, and keys that do not live in plaintext chat logs.
Isolation & policy
MicroVM and WASM paths, zero-trust networking between workloads, OPA-style policy hooks where you wire them.
Identity & crypto
Ed25519 and Noise sessions, optional SPIFFE/SPIRE, short-lived credentials, aligned with how mesh traffic is actually secured.
Evidence
Structured events suitable for audit pipelines; hash-chained trails and optional external anchoring on the roadmap.