Decentralized Agentic OS — sandboxed WASM agents with capability-based security over Cap'n Proto RPC
-
Updated
Mar 3, 2026 - Rust
Decentralized Agentic OS — sandboxed WASM agents with capability-based security over Cap'n Proto RPC
The markdown coordination layer for agents. One readable timeline where agents claim tasks, post results, and hand off work. You see everything. They never duplicate work.
A local-first WebAssembly sandbox runtime with capability-based security
Deterministic, auditable, capability-safe autonomous agent framework in Rust. Event-sourced, replayable, with governed self-evolution.
Rust microkernel for GPU-isolated AI inference
Secure-execution domain repository providing modular runtime-security components for sandboxing, capability enforcement, cryptographic isolation, audit logging, and policy-driven execution control — designed for building hardened application and infrastructure runtimes.
🛡️ WASI 0.2 security simulation: A data diode runtime that allows sensor reads but blocks network exfiltration. Built with Rust, Leptos, and the Component Model
Example skills, manifests, and reference projects for building on Inactu.
A deterministic, distributed, capability-safe execution fabric for agent workflows with verifiable replay and certified audit trails
Secure execution substrate for immutable agent skills with explicit capabilities, cryptographic provenance, and auditable deterministic runs.
VAC Protocol - Capability-based security for AI agents. Task-scoped credentials, receipt-based state, instant revocation.
Capability-based authentication system for AI agents.
Edge computing demo with Rust + WASM. Features URL shortener, rate limiter, and capability-based security—all running on Cloudflare Workers. Interactive Leptos dashboard with live stats. Demonstrates Workers KV, edge-based rate limiting, and WASI security patterns.
Toy governance CLI demo: deny-by-default “danger actions” gated by signed, expiring capability leases (global revoke-all + nonce revoke) plus guarded memory quarantine. Simulation-only: no real network/shell/files. Includes tripwire + tests to prevent misuse.
A data-driven, cryptographically signed, registry-backed AI operating system, with capability-scoped execution and graph-executable workflows — living inside your projects, running through a recursive MCP that goes as deep as you dare.
Coordinate AI agents and humans with a shared markdown timeline that tracks tasks, results, and handoffs to prevent duplication and data loss.
Add a description, image, and links to the capability-based-security topic page so that developers can more easily learn about it.
To associate your repository with the capability-based-security topic, visit your repo's landing page and select "manage topics."