DEFENSE
Architecture and patterns that govern action.
Layered controls that observe, interpret, constrain, and audit behaviour as it unfolds — across the agent runtime.
PATTERNS
Pick a pattern, ship a control.
ARCHITECTURE
Defense architecture
The reference architecture that connects the patterns below.
Read → RUNTIMESecure agent runtime
Sandboxing, isolation, policy enforcement, and observability inside the loop.
Read → TOOLSSecure tool calling
Brokers, schemas, scopes, allow-lists, side-effect controls, approvals.
Read → MCPSecure MCP
Trust boundaries, transport, capability scoping, untrusted-context handling.
Read → MEMORYMemory security
Write paths, provenance, poisoning detection, retention controls.
Read → CREDENTIALSCredential & token boundaries
Delegated authority, scoped tokens, credential brokers, least-privilege impersonation.
Read → PATTERNSSecure engineering patterns
Cross-cutting engineering patterns that hold the rest together.
Read →