Security Features (AKIOS V1.0)

Defense-in-depth for every run: sandbox, PII redaction, audit trail, and cost/loop kills.

Supported versions

Version Support Security updates
1.0.x ✅ Active ✅ Yes
<1.0 ❌ EOL ❌ No

Report vulnerabilities

Private only: hello@akios.ai
Include: description, repro steps, affected version, impact (e.g., sandbox bypass, PII leak, cost overrun), suggested fix, contact.
Response target: ack ≤24h, triage ≤72h, fix 2–4 weeks with coordinated disclosure.

What V1.0 enforces

  • Container isolation: command/path allowlists, cgroups quotas, process isolation, default-deny network.
  • AI protections: 50+ PII patterns (inputs/outputs), loop detection, budget/token kill-switches, size limits and validation, retry/backoff.
  • Audit & compliance: Merkle-style tamper-evident logs, PII-safe by default, exportable JSON for reviews.

Verify now

akios status --security          # expect Full/Strong, PII:on, audit:on, network:deny unless enabled
akios audit verify               # expect Integrity OK

If results differ, check Installation and Config Reference.

Platform specifics

  • Native Linux: kernel-hard (cgroups v2 + seccomp-bpf), best isolation/perf.
  • Docker (macOS/Windows/Linux): strong policy isolation and redaction; host FS perms and seccomp strictness depend on host—prefer native Linux for high-assurance.

Verify your posture

akios status --security          # dashboard
akios status --security --json   # machine-readable

Shows: security level (Full/Strong), PII protection, network allow/deny, audit status, cost/token limits, compliance indicators.

Reminder: No software is 100% secure; run AKIOS in isolated environments and validate outputs.

Related