AKIOS V1.0 – Configuration Reference
Single config.yaml governs the runtime. Loaded at startup; immutable during execution. Defaults are security-first.
Where config lives
project/
├── config.yaml # main config
├── workflows/ # your workflows
├── templates/ # examples
├── data/ # input/output
└── audit/ # tamper-evident logs
Load order (highest first): environment variables → .env → config.yaml → built-in defaults.
Setup & validation
- First run of
akios run templates/hello-workflow.ymllaunches the setup wizard. - Manual:
akios setup(or--forceto rerun). --real-apiflips to real calls (setsAKIOS_MOCK_LLM=0, enables network, prompts for keys).- Corruption guard flags bad provider names, malformed booleans, invalid key formats with suggested fixes.
Sensitive values (.env)
AKIOS_LLM_PROVIDER=grok # openai|anthropic|grok|mistral|gemini
AKIOS_LLM_MODEL=grok-3 # provider-specific
AKIOS_MOCK_LLM=0 # 0=real,1=mock
AKIOS_NETWORK_ACCESS_ALLOWED=1 # allow HTTP agent
AKIOS_FORCE_PULL=1 # wrapper always pulls latest image
OPENAI_API_KEY=sk-... # provider keys (one or more)
Most-used overrides
export AKIOS_LLM_PROVIDER=openai
export AKIOS_NETWORK_ACCESS_ALLOWED=1
export AKIOS_BUDGET_LIMIT_PER_RUN=1.0
Key config fields (security-first defaults)
sandbox_enabled: true # isolation (kernel-hard on Linux, policy in Docker)
cpu_limit: 0.8 # fraction of CPU
memory_limit_mb: 256
max_open_files: 100
max_file_size_mb: 10
network_access_allowed: false
pii_redaction_enabled: true
redaction_strategy: "mask" # mask|hash|remove
pii_redaction_outputs: true
cost_kill_enabled: true
max_tokens_per_call: 500
budget_limit_per_run: 1.0
audit_enabled: true
audit_storage_path: "./audit/"
audit_export_format: "json"
environment: "development"
log_level: "INFO"
Environment overrides
export AKIOS_CPU_LIMIT=0.5
export AKIOS_MEMORY_LIMIT_MB=128
export AKIOS_BUDGET_LIMIT_PER_RUN=0.5
export AKIOS_LOG_LEVEL=DEBUG
Example profiles
Production (secure)
sandbox_enabled: true
cpu_limit: 0.5
memory_limit_mb: 128
network_access_allowed: false
budget_limit_per_run: 1.0
log_level: "WARNING"
Development (relaxed)
network_access_allowed: true
budget_limit_per_run: 5.0
log_level: "DEBUG"
Security notes
- Treat
config.yaml/.envas read-only at runtime; set file perms to600. - Fail fast:
akios statussurfaces config validation; invalid configs stop before execution. Security Level: Strong policy-based security Configuration Notes: - Consistent behavior across platforms
- Container isolation instead of kernel sandboxing
- Network controls via container policies
- Memory and CPU limits via Docker
Choosing the Right Installation
| Use Case | Recommended Method | Why |
|---|---|---|
| Maximum security, Linux production | Pip Package | Kernel-hard security features |
| Cross-platform development team | Docker | Consistent environment everywhere |
| Python ecosystem integration | Pip Package | Full Python compatibility |
Platform-Specific Configuration
Linux (All Methods)
# Maximum security available
sandbox_enabled: true # seccomp-bpf + cgroups
environment: "production"
macOS/Windows (Docker)
# Strong policy-based security
sandbox_enabled: true # Container policies + allowlisting
environment: "production"
# Note: No kernel-hard seccomp-bpf available
Docker (All Platforms)
# Container-aware settings
sandbox_enabled: true
network_access_allowed: true # For HTTP agent
# Docker handles resource isolation
Configuration Validation by Method
AKIOS validates configuration compatibility with your deployment method:
# Pip package - validates Linux kernel features
akios status # Shows kernel-hard security status
# Docker - validates container environment
akios status # Shows policy-based security status
Tip: Run akios status after installation to see your security capabilities and configuration status.