Compile-time capability-based security for Rust
-
Updated
Mar 25, 2026 - Rust
Compile-time capability-based security for Rust
Programmable Rust runtime framework for AI systems and LLMs. Interactive, agentic, and ledgered execution across models, tools, code, and real world workflows.
Decentralized Agentic OS — sandboxed WASM agents with capability-based security over Cap'n Proto RPC
The markdown coordination layer for agents. One readable timeline where agents claim tasks, post results, and hand off work. You see everything. They never duplicate work.
An agent-first runtime where AI agents are native processes, capabilities replace permissions, and the system is designed for autonomy — not human interaction.
Aster RPC -- peer-to-peer RPC framework with identity in the connection. Machines authenticate to machines, on behalf of users. Built on iroh QUIC + Apache Fory + capability-based credentials.
InferNode is a security-focused 64-bit Inferno® OS (ARM64/AMD64) for embedded systems, servers, and AI agents. GPL-free, headless-capable, with 280+ utilities and 9P filesystem protocol. Providing a namespace-based alternative to MCP servers. Namespace-bounded security has been formally verified.
A local-first WebAssembly sandbox runtime with capability-based security
A data-driven, cryptographically signed, registry-backed AI operating system, with capability-scoped execution and graph-executable workflows — living inside your projects, running through a recursive MCP that goes as deep as you dare.
Secure-execution domain repository providing modular runtime-security components for sandboxing, capability enforcement, cryptographic isolation, audit logging, and policy-driven execution control — designed for building hardened application and infrastructure runtimes.
Capability-based authorization and policy enforcement for agents using large MCP and A2A tool ecosystems.
Deterministic, auditable, capability-safe autonomous agent framework in Rust. Event-sourced, replayable, with governed self-evolution.
Rust microkernel for GPU-isolated AI inference
Semantic substrate for programming languages
AIP conformance validator and IBCT chain auditor. Tracks draft-prakash-aip-00.
🛡️ WASI 0.2 security simulation: A data diode runtime that allows sensor reads but blocks network exfiltration. Built with Rust, Leptos, and the Component Model
A pattern for implementing "insider" encapsulation (trusted/"friend"-only access) of properties and methods in native JavaScript using ES2022 private fields and explicit trust declarations.
VAC Protocol - Capability-based security for AI agents. Task-scoped credentials, receipt-based state, instant revocation.
Secure execution substrate for immutable agent skills with explicit capabilities, cryptographic provenance, and auditable deterministic runs.
Embedded typed effect language for Go — Atkey indexed monads with row-typed capabilities. Purpose-built for AI agent sandboxing.
Add a description, image, and links to the capability-based-security topic page so that developers can more easily learn about it.
To associate your repository with the capability-based-security topic, visit your repo's landing page and select "manage topics."