SHADI¶
Runtime Safety Infrastructure for Agentic Systems¶
Secure Host for Agentic AI Dynamic Instantiation (SHADI) is a hardened runtime for agents operating near real credentials, local data, and developer tooling. It enforces launch-time policy through verified identity, gated secret access, OS-level sandboxing, encrypted local memory, and secure transport.
Why SHADI¶
SHADI is built for environments where trust boundaries matter:
- Secrets are only released to verified sessions.
- Sandbox policy is enforced by the OS, not prompt intent.
- Memory stays encrypted at rest.
- Transport between agents is authenticated and protected.
Five Layers of Runtime Safety¶
Each layer builds on the previous one to reduce blast radius and make behavior auditable.
- Verified Identity: deterministic human-to-agent derivation with provenance checks.
- Secrets Gate: keychain-backed secrets with optional 1Password integration.
- Kernel Sandbox: OS-enforced policies with portable profiles and JSON policy support.
- Encrypted Memory: SQLCipher-backed local state for agent memory.
- Secure Transport: MLS-backed messaging via SLIM and A2A.
Architecture Snapshot¶
SHADI presents the runtime as four product layers:
- Experience and control: operators define profiles, policies, and workload launch intent.
- Secure runtime: identity, secret control, trusted delivery, sandboxing, transport, and encrypted memory enforce the launch contract.
- Protected workloads: agents and tools run inside that approved boundary.
- External systems: GitHub, model providers, and SLIM/A2A peers are reached only after policy and trust checks succeed.
Core Capabilities¶
- Git-backed sandbox snapshots for before/after capture and audit trails.
- Process-scoped secret injection and trusted delivery with exact executable matching.
- Python bindings for secrets, memory, and sandboxed execution.
- CLI workflows for policy, identity, key management, and sandbox execution.
- Example agents and demos, including a SecOps workflow against real GitHub signals.
Start Here¶
- New to SHADI? Start with Getting Started.
- Running or debugging live agent workflows? Use Operations.
- Need the system model? Read Architecture and Security Notes.
- Integrating into an agent or app? Start with the API Guide.
- Looking for flags and commands? See the CLI Reference.
By Role¶
Operator - Getting Started - Operations - Security Notes
Agent or Platform Engineer - Architecture - API Guide - SLIM and A2A or Google ADK
Security Engineering - Security Notes - SecOps Demo - Design Overview
Documentation Map¶
- Introduction: framing, architecture, security, and design intent.
- Guides: onboarding and operational flows for setup, sandboxing, and demos.
- Integrations: API usage plus transport and framework integration notes.
- Reference: commands and flags for
shadictl.
Runtime Model (At a Glance)¶
- Identity verification determines whether a session is trusted.
- Secrets are released only to verified sessions and only through the policy-approved disclosure or trusted-delivery path.
- Sandbox policy and secret-delivery policy are resolved before process start and enforced by the OS plus SHADI launch mediation.
- Local memory stays encrypted at rest.
- Inter-agent transport is protected by MLS-backed messaging.
The current policy framework distinguishes three secret-delivery modes:
- explicit disclosure to the launched process (
--inject-keychain,process_inject_keychain) - process-scoped trusted secret delivery to the launched process (
process_trusted_secret) - action-based delegated delivery to a verified child process on Unix/macOS (
process_secret_policywithdelegate-to-child)
For a deeper walkthrough, continue to Architecture.