AKIOS wraps any AI agent in a hardened security cage β kernel-level process isolation,
real-time PII redaction, cryptographic Merkle audit trails, and automatic cost kill-switches β
so you can deploy AI workflows in regulated environments without building security from scratch.
Quick Start Β· Architecture Β· Features Β· Documentation Β· Contributing
Every workflow step passes through five security layers before anything touches the outside world.
ββββββββββββββββββββββββββββββββββββββ
β Untrusted AI Agents β
β LLMs, Code, Plugins β
ββββββββββββββββββββ¬ββββββββββββββββββ
β
βΌ
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β AKIOS SECURITY RUNTIME β
β β
β ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ β
β β 1. Policy Engine allowlist verification β β
β β 2. Kernel Sandbox seccomp-bpf + cgroups v2 β β
β β 3. PII Redaction 44 patterns, 6 categories β β
β β 4. Budget Control cost kill-switches, token limits β β
β β 5. Audit Ledger Merkle tree, SHA-256, JSONL β β
β ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ β
β β
ββββββββββββββββββββββββββββββββββ€ββββββββββββββββββββββββββββββββ
β
βΌ
ββββββββββββββββββββββββββββββββββββββ
β Protected Infrastructure β
β APIs, Databases, Cloud β
ββββββββββββββββββββββββββββββββββββββ
pip install akios
akios init my-project && cd my-project
akios setup # Configure LLM provider (interactive)
akios run templates/hello-workflow.yml # Run inside the security cageπ¦ Docker (all platforms β macOS, Linux, Windows)
curl -O https://raw.githubusercontent.com/akios-ai/akios/main/src/akios/cli/data/wrapper.sh
mv wrapper.sh akios && chmod +x akios
./akios init my-project && cd my-project
./akios run templates/hello-workflow.yml$ akios run workflow.yml
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β AKIOS Security Cage β
β βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ£
β π Sandbox: ACTIVE (seccomp-bpf + cgroups v2) β
β π« PII Scan: 44 patterns loaded β
β π° Budget: $1.00 limit ($0.00 used) β
β π Audit: Merkle chain initialized β
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
βΆ Step 1/3: read-document βββββββββββββββββββββββββββββ
Agent: filesystem β Action: read
β PII redacted: 3 patterns found (SSN, email, phone)
β Audit event #1 logged
βΆ Step 2/3: analyze-with-ai βββββββββββββββββββββββββββ
Agent: llm β Model: gpt-4o β Tokens: 847
β Prompt scrubbed before API call
β Cost: $0.003 of $1.00 budget
β Audit event #2 logged
βΆ Step 3/3: save-results βββββββββββββββββββββββββββββ
Agent: filesystem β Action: write
β Output saved to data/output/run_20250211_143052/
β Audit event #3 logged
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β
Workflow complete β 3 steps β $0.003 β 0 PII leaked
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
AI agents can leak PII to LLM providers, run up massive bills, execute dangerous code, and leave no audit trail. Every team building with LLMs faces this security engineering burden.
AKIOS provides compliance-by-construction β security guarantees that are architectural, not bolted on:
| Without AKIOS | With AKIOS | |
|---|---|---|
| π« | PII leaks to LLM providers | Automatic redaction before any API call |
| πΈ | Runaway API costs | Hard budget limits with kill-switches |
| π | No audit trail for compliance | Cryptographic Merkle-chained logs |
| π | Manual security reviews | Kernel-enforced process isolation |
| π€ | Hope-based security | Proof-based security |
|
seccomp-bpf syscall filtering + cgroups v2 resource isolation on native Linux. Policy-based isolation on Docker (all platforms). 44 detection patterns across 6 categories: personal, financial, health, digital, communication, location. Covers SSN, credit cards, emails, phones, addresses, API keys, and more. Redaction happens before data reaches any LLM. Every action is cryptographically chained. Tamper-evident JSONL logs with SHA-256 proofs. Export to JSON for compliance reporting. |
Hard budget limits ($1 default) with automatic workflow termination. Token tracking across all providers. Real-time OpenAI, Anthropic, Grok (xAI), Mistral, Gemini, AWS Bedrock, Ollama β swap providers in one line of config. All calls are sandboxed, audited, and budget-tracked. |
AKIOS orchestrates YAML-defined workflows through 6 secure agents β each running inside the security cage:
# workflow.yml β every step runs inside the cage
name: "document-analysis"
steps:
- name: "read-document"
agent: filesystem # π Path-whitelisted file access
action: read
parameters:
path: "data/input/report.pdf"
- name: "analyze-with-ai"
agent: llm # π€ Token-tracked, PII-scrubbed
action: complete
parameters:
prompt: "Summarize this document: {previous_output}"
model: "gpt-4o"
max_tokens: 500
- name: "notify-team"
agent: http # π Domain-whitelisted, rate-limited
action: post
parameters:
url: "https://api.example.com/webhook"
json:
summary: "{previous_output}"π Preview what the LLM actually sees (after PII redaction)
$ akios protect show-prompt workflow.yml
Interpolated prompt (redacted):
"Summarize this document: The patient [NAME_REDACTED] with
SSN [SSN_REDACTED] was seen at [ADDRESS_REDACTED]..."
# 3 PII patterns redacted before reaching OpenAI| Environment | Isolation | PII | Audit | Budget | Best For |
|---|---|---|---|---|---|
| Native Linux | seccomp-bpf + cgroups v2 | β | β | β | Production, maximum guarantees |
| Docker (all platforms) | Container + policy-based | β | β | β | Development, cross-platform |
Native Linux provides kernel-level guarantees where dangerous syscalls are physically blocked. Docker provides strong, reliable security across macOS, Linux, and Windows.
| Command | Description |
|---|---|
akios init my-project | Create secure workspace with templates |
akios setup | Configure LLM provider (interactive) |
akios run workflow.yml | Execute workflow inside security cage |
akios workflow validate w.yml | Validate workflow YAML against schema |
akios status | Security & budget dashboard |
akios status --budget | Cost tracking breakdown per workflow |
akios cage up / down | Activate / destroy cage + all data |
akios cage up --no-pii --no-audit | Ablation mode (benchmarking) |
akios cage down --passes N | Secure overwrite with N passes |
akios protect scan file.txt | Scan file for PII patterns |
akios protect show-prompt w.yml | Preview what the LLM sees (redacted) |
akios audit verify | Verify Merkle chain integrity |
akios audit stats | Audit ledger statistics (event count, Merkle root) |
akios audit rotate | Rotate audit log with Merkle chain linkage |
akios audit export --format json | Export audit logs for compliance |
akios doctor | System health check |
akios templates list | Browse industry workflow templates |
akios http GET https://... | Secure HTTP request via agent |
Measured on AWS EC2 t4g.micro (ARM64, 1 GB RAM) β the smallest instance available.
| Operation | Latency | Notes |
|---|---|---|
| Full security pipeline | 0.47 ms | PII + policy + audit + budget |
| PII scan (44 patterns) | 0.46 ms | All 6 categories |
| SHA-256 Merkle hash | 0.001 ms | Per audit event |
| CLI cold start (Docker) | ~1.4 s | One-time startup |
Sub-millisecond overhead means security adds virtually zero cost to your workflows.
π Reproducibility & methodology
All benchmarks are reproducible. See EC2 Performance Testing for the full methodology, validation procedures, and instructions to run on your own infrastructure.
| Guide | Description | |
|---|---|---|
| π | Getting Started | 3-minute setup guide |
| β¨οΈ | CLI Reference | All commands and flags |
| βοΈ | Configuration | Settings, .env, config.yaml |
| π | Security | Architecture and threat model |
| π€ | Agents | Filesystem, HTTP, LLM, Tool Executor, Webhook, Database |
| π³ | Deployment | Docker, native Linux, EC2 |
| π§ | Troubleshooting | Common issues and fixes |
| π | Changelog | Release history |
Click to expand source tree
src/akios/
βββ cli/ # 21 CLI commands (argparse)
β βββ commands/ # audit, compliance, doctor, http, protect, run, ...
βββ config/ # YAML + .env configuration, themes, detection
βββ core/
β βββ analytics/ # Cost tracking (cost_tracker.py)
β βββ audit/ # Merkle-chained JSONL ledger
β β βββ merkle/ # SHA-256 Merkle tree (tree.py, node.py)
β βββ compliance/ # Security posture scoring
β βββ runtime/
β β βββ agents/ # LLM, HTTP, Filesystem, ToolExecutor, Webhook, Database
β β βββ engine/ # Workflow orchestrator + kill switches
β β βββ llm_providers/ # OpenAI, Anthropic, Grok, Mistral, Gemini, Bedrock, Ollama
β β βββ workflow/ # YAML parser + validator
β βββ ui/ # Rich terminal output, PII display, colors
βββ security/
βββ pii/ # 44 regex patterns, 6 categories (detector, redactor, rules)
βββ sandbox/ # cgroups v2 resource isolation (manager, quotas)
βββ syscall/ # seccomp-bpf policy + interceptor
βββ validation.py # Runtime security validation
AKIOS introduces compliance-by-construction β the idea that security guarantees should be architectural properties of the runtime, not features that can be misconfigured or bypassed.
Our NeurIPS 2026 submission formalizes this paradigm. Preprint coming soon on arXiv.
We welcome contributions! See CONTRIBUTING.md for guidelines.
git clone https://github.com/akios-ai/akios.git
cd akios
make build # Build Docker image
make test # Run test suiteGood first issues are tagged with good first issue.
- π Documentation
- π¬ GitHub Discussions
- π Issue Tracker
- π Security issues β security@akioud.ai (private disclosure)
βοΈ Legal & Disclaimers
EU AI Act: AKIOS is not designed for "high-risk" use cases under the EU AI Act. For such deployments, consult a compliance expert and implement additional regulatory controls on top of AKIOS.
AKIOS is provided "AS IS" without warranty of any kind. By using AKIOS you acknowledge:
- You are responsible for your own API keys, cloud costs (AWS/GCP/Azure), IAM configurations, credential management, and infrastructure security. AKIOS cost kill-switches cover LLM API spend only β not compute, storage, or data transfer.
- Docker mode provides strong policy-based security but does not enforce host filesystem permissions or kernel-level seccomp-bpf isolation. For maximum security, use native Linux with sudo.
- Performance varies by instance type, region, load, and configuration. Published benchmarks are measured on AWS EC2 t4g.micro (ARM64) in us-east-1 and may not match your environment.
- PII redaction uses regex pattern matching (44 patterns, >95% accuracy) β it is not a substitute for professional data governance. Review output before sharing with external parties.
- Audit logs in Docker may lose up to ~100 events if the container is forcefully killed (SIGKILL) during a flush window. Use native Linux for zero-loss audit durability.
AKIOS is not responsible for: cloud infrastructure charges, credential leaks, data breaches from misconfigured deployments, performance on untested platforms, or regulatory compliance decisions. See LEGAL.md and SECURITY.md for full details.
AKIOS covers 44 PII patterns, 6 agents, and full audit logging for most compliance workflows. If your organization needs extended PII coverage (50+ patterns including jurisdiction-specific identifiers), governance dashboards, or dedicated support, visit akioud.ai to learn about our commercial offerings.
EnforceCore β The open-source enforcement library (Apache-2.0) for AI agents. EnforceCore provides general-purpose policy enforcement, PII redaction, and audit trails for any agent framework. AKIOS is the complete production runtime built on top of it, adding kernel-level sandboxing, comprehensive PII redaction, workflow orchestration, and compliance reporting.
AKIOS is licensed under GPL-3.0-only. See NOTICE, LEGAL.md, and THIRD_PARTY_LICENSES.md.
Get Started Β· CLI Reference Β· Agents Β· Changelog
Built by akios-ai Β· Licensed under GPL-3.0-only
