Skip to content
Pilox

Security

Vault

Grant the minimum autonomy an agent needs, instrument the rest — microVM and WASM paths, crypto-aligned identity, and structured events for review.

Jump to this topic on the homepage

Deep dive

“Vault” here is the security posture for autonomous software: least agency, strong isolation, cryptographic identity where the mesh meets the internet, and evidence that auditors can follow. It is not a single product box — it is how Pilox stacks defenses from the kernel boundary up through prompts and policies.

Isolation and blast radius

MicroVMs shrink blast radius per agent when the platform can allocate a VM. WASM paths trade some of that for density and start-up time. Capability-style tokens (roadmap) aim to ensure each agent receives only the permissions its task requires, not a superset of org-wide keys.

Identity and encryption

SPIFFE / SPIRE integration is planned for workload identity and mTLS-oriented meshes. On the hardened A2A SDK path, Noise Protocol E2E gives forward-secrecy-oriented designs between agents. Effectiveness always depends on how you deploy and rotate credentials.

Prompt and content safety

Layered defenses include schema enforcement, LLM Guard, LlamaFirewall, and NeMo Guardrails-class tooling. None of these replace human review of high-risk flows; they reduce naive injection and unsafe tool invocation when configured with your policies.

Audit and evidence

Hash-chained events in PostgreSQL and optional Sigstore Rekor anchoring are directional for immutable audit trails. The objective is defensible logs: what ran, who attested it, and how integrity is verified externally.

Security

Security posture

Least-agency for automated workloads: grant the minimum autonomy an agent needs, instrument the rest.

Least agency

Agents receive no latent permissions by default. Access is ephemeral, scoped, and verified each cycle — the core posture for anything that runs unsupervised on your estate.

Hardware root of trust

Identity and workload attestation align with how you already bind trust: TPM / Secure Enclave paths, SPIFFE-ready meshes, and keys that do not live in plaintext chat logs.

Isolation & policy

MicroVM and WASM paths, zero-trust networking between workloads, OPA-style policy hooks where you wire them.

Identity & crypto

Ed25519 and Noise sessions, optional SPIFFE/SPIRE, short-lived credentials, aligned with how mesh traffic is actually secured.

Evidence

Structured events suitable for audit pipelines; hash-chained trails and optional external anchoring on the roadmap.