Document Version: 1.4.4 Date: 2026-03-11
AKIOS v1.4.4 is a minimal, open-source security cage for AI agents.
We take security very seriously β the entire product is built around hard containment, real-time protection, and provable audit.
This policy explains how we handle vulnerabilities in the open runtime.
| Version | Supported | Security Updates |
|---|---|---|
| 1.0.x | β Active | β Full Support |
| <1.0 | β End of Life | β No Support |
DO NOT report security issues on public GitHub.
Send private reports to: security@akioud.ai
- Clear description of the vulnerability
- Steps to reproduce
- Affected versions
- Potential impact (e.g. sandbox bypass, PII leak, cost overrun)
- Suggested fix (if any)
- Your contact info
- Acknowledgment: Within 24 hours
- Triage & Validation: Within 72 hours
- Fix Development: 2β4 weeks (depending on severity)
- Coordinated Disclosure: We release fix + advisory together
- Credit: We publicly thank responsible reporters (Hall of Fame)
- Security sandboxing (kernel-hard on native Linux, strong policy-based in Docker)
- Syscall interception & resource quotas
- Real-time PII redaction (44 patterns across 6 categories)
- Enforced cost & infinite loop kill-switches
- Merkle tamper-evident audit ledger
- Non-root Docker container β containers run as UID 1001 by default
- AST-safe condition evaluator β no
eval()anywhere in the codebase - REST API β self-hosted FastAPI server (
akios serve) with OpenAPI spec - Cage down data destruction β session data wipe (audit logs, workflow outputs)
- HTTPS domain whitelist β selective network access for HTTP agent
--execrejection β shell-injection trap blocks arbitrary command executionakios httpβ secure HTTP requests with domain whitelisting & PII redactionakios protect show-promptβ preview interpolated + redacted LLM prompts
Security Cage Lifecycle:
cage upβ activate protections β workflows execute β data generatedcage downβ session data destroyed (audit/, data/output/) β input data preserved
Secure Data Erasure (cage down):
- Each file is overwritten with cryptographically random bytes, fsynced to disk, overwritten with zeros, fsynced again, then deleted (
unlink) --passes Noption repeats the overwrite cycle N times (default: 1)--fastoption skips overwrite and just deletes (for CI/CD cleanup where forensic recovery is not a concern)β οΈ SSD caveat: On solid-state drives with wear-leveling, overwritten sectors may be remapped. Extra passes have limited benefit. For maximum security on SSDs, use full-disk encryption (LUKS/FileVault) as the underlying layer.
Network Security:
- Default: All network access blocked
allowed_domainswhitelist for HTTP agent (specific domains only)- LLM APIs always permitted (OpenAI, Anthropic, Grok, Mistral, Gemini, Bedrock, Ollama)
No guarantees: No software is 100% secure.
Users must secure their environment and validate outputs.
Security reports: security@akioud.ai
General questions: hello@akios.ai
Thank you for helping keep the cage strong.
AKIOS β Where AI meets unbreakable security
Use responsibly. Your safety and compliance are your responsibility. π‘οΈ