Use Cases & Patterns

Practical ways to apply the AKIOS security cage in production.

Core patterns

  • Run untrusted/3rd-party agents safely with default-deny network/fs and audit.
  • Pre-flight in CI/CD: validate policies and costs before deploy.
  • Handle sensitive data: PII redaction + tamper-evident audit on every step.
  • Guarded tool execution: allowlist commands and paths, no ambient network.

Examples

1) Secure document processing (public sector)

name: "Secure Document Summary"
steps:
  - step: read_pdf
    agent: filesystem
    action: read
    parameters:
      path: "/inputs/application.txt"
  - step: analyze
    agent: llm
    action: complete
    parameters:
      model: "gpt-4"
      prompt: "Summarize this application: {{read_pdf.content}}"
  - step: save
    agent: filesystem
    action: write
    parameters:
      path: "/outputs/summary.txt"
      content: "{{analyze.text}}"

Why it fits: automatic PII redaction + signed audit trail.

2) API enrichment with budget guard (finance)

name: "KYC Enrichment"
steps:
  - step: fetch_data
    agent: http
    action: get
    parameters:
      url: "https://api.external-data.com/user/{{user_id}}"
  - step: risk_analysis
    agent: llm
    action: complete
    parameters:
      model: "claude-3.5-sonnet"
      prompt: "Analyze risk for this user data: {{fetch_data.body}}"
  - step: save_report
    agent: filesystem
    action: write
    parameters:
      path: "/reports/{{user_id}}_risk.json"
      content: "{{risk_analysis.text}}"

Why it fits: enforced budget/token limits + redaction on inputs/outputs.

3) Safe tool execution (DevOps)

name: "Log Analyzer"
steps:
  - step: run_script
    agent: tool_executor
    action: run
    parameters:
      command: "python3 /scripts/analyze_logs.py --input /logs/server.log"

Why it fits: command allowlist, default-deny network, bounded paths.

Related