FAQ & Glossary (AKIOS V1.0)
Quick FAQ
- Is AKIOS an agent framework? No. It’s a security cage that runs agents/workflows with strict policies, sandboxing, redaction, and audit.
- What’s the strongest setup? Pip on native Linux (cgroups v2 + seccomp-bpf). Docker wrapper is strong/policy-based across macOS/Win/Linux.
- Where are my outputs?
data/output/run_* per execution; audit logs in audit/audit_events.jsonl.
- How do I switch to real APIs?
--real-api or set AKIOS_MOCK_LLM=0 and ensure API key + network_access_allowed=true.
- How do I check security status?
akios status --security and akios audit verify.
- What if a workflow fails validation? Ensure each step has
agent, action, parameters; use allowed agents only; see Policy Schema.
Glossary
- Security cage: The enforced sandbox + policies + redaction + audit layer AKIOS wraps around every workflow.
- Policy-based vs kernel-hard: Policy-based (Docker, macOS/Win) uses container isolation; kernel-hard (Linux pip) adds seccomp-bpf + cgroups v2 on host.
- allowed_paths: Explicit filesystem allowlist for the filesystem agent; anything else is denied.
- PII redaction: Real-time masking/hashing/removal of sensitive patterns on inputs/outputs.
- Merkle audit: Tamper-evident log chain;
akios audit verify checks integrity.
- mock_llm / --real-api: Mock mode returns synthetic outputs; real API mode uses provider endpoints with budgets/redaction intact.
- Budget/loop kill-switch: Hard limits on cost/tokens and loop detection to stop runaway workflows.
- Agents: Four primitives—filesystem, http, llm, tool_executor—used to compose workflows; no arbitrary code execution outside them.