Skip to content

SHADI

Runtime Safety Infrastructure for Agentic Systems

Secure Host for Agentic AI Dynamic Instantiation (SHADI) is a hardened runtime for agents operating near real credentials, local data, and developer tooling. It enforces launch-time policy through verified identity, gated secret access, OS-level sandboxing, encrypted local memory, and secure transport.

Get Started | Read the Docs

Why SHADI

SHADI is built for environments where trust boundaries matter:

  • Secrets are only released to verified sessions.
  • Sandbox policy is enforced by the OS, not prompt intent.
  • Memory stays encrypted at rest.
  • Transport between agents is authenticated and protected.

Five Layers of Runtime Safety

Each layer builds on the previous one to reduce blast radius and make behavior auditable.

  1. Verified Identity: deterministic human-to-agent derivation with provenance checks.
  2. Secrets Gate: keychain-backed secrets with optional 1Password integration.
  3. Kernel Sandbox: OS-enforced policies with portable profiles and JSON policy support.
  4. Encrypted Memory: SQLCipher-backed local state for agent memory.
  5. Secure Transport: MLS-backed messaging via SLIM and A2A.

Architecture Snapshot

SHADI presents the runtime as four product layers:

  1. Experience and control: operators define profiles, policies, and workload launch intent.
  2. Secure runtime: identity, secret control, trusted delivery, sandboxing, transport, and encrypted memory enforce the launch contract.
  3. Protected workloads: agents and tools run inside that approved boundary.
  4. External systems: GitHub, model providers, and SLIM/A2A peers are reached only after policy and trust checks succeed.

Core Capabilities

  • Git-backed sandbox snapshots for before/after capture and audit trails.
  • Process-scoped secret injection and trusted delivery with exact executable matching.
  • Python bindings for secrets, memory, and sandboxed execution.
  • CLI workflows for policy, identity, key management, and sandbox execution.
  • Example agents and demos, including a SecOps workflow against real GitHub signals.

Start Here

By Role

Operator - Getting Started - Operations - Security Notes

Agent or Platform Engineer - Architecture - API Guide - SLIM and A2A or Google ADK

Security Engineering - Security Notes - SecOps Demo - Design Overview

Documentation Map

  • Introduction: framing, architecture, security, and design intent.
  • Guides: onboarding and operational flows for setup, sandboxing, and demos.
  • Integrations: API usage plus transport and framework integration notes.
  • Reference: commands and flags for shadictl.

Runtime Model (At a Glance)

  1. Identity verification determines whether a session is trusted.
  2. Secrets are released only to verified sessions and only through the policy-approved disclosure or trusted-delivery path.
  3. Sandbox policy and secret-delivery policy are resolved before process start and enforced by the OS plus SHADI launch mediation.
  4. Local memory stays encrypted at rest.
  5. Inter-agent transport is protected by MLS-backed messaging.

The current policy framework distinguishes three secret-delivery modes:

  • explicit disclosure to the launched process (--inject-keychain, process_inject_keychain)
  • process-scoped trusted secret delivery to the launched process (process_trusted_secret)
  • action-based delegated delivery to a verified child process on Unix/macOS (process_secret_policy with delegate-to-child)

For a deeper walkthrough, continue to Architecture.