Secure Host for Agentic AI Dynamic Instantiation (SHADI) is a secure runtime for AI agents.
It gives agents a safer place to run by combining identity verification, gated secret access, OS-level sandboxing, encrypted local memory, and secure messaging.
SHADI is for teams that want agents to work with real tools and real credentials without treating the host machine as a fully trusted environment.
- Verify who an agent is before releasing secrets.
- Constrain what a process can read, write, execute, and reach on the network.
- Keep local memory encrypted at rest.
- Connect agents over authenticated SLIM messaging.
- Audit changes with snapshots and runtime inspection tools.
shadictl: the main CLI for policy, sandbox execution, identity, secrets, memory, and shell control.shadi_sandbox: OS-enforced sandbox policy.agent_secrets: keychain-backed secret storage and verification gates.shadi_memory: SQLCipher-backed local memory.agent_transport_slim: secure transport and stdio bridge support.examples/shadi_demo_bot: a Rust demo bot that exercises the main SHADI features, including SLIM messaging.
On Linux, install the latest released shadictl with:
curl -fsSL https://agntcy.github.io/shadi/install.sh | bashFor pinned versions, custom install paths, and installer environment overrides, see docs/install.md.
On macOS, you can install the latest released shadictl formula with Homebrew:
brew tap agntcy/shadi https://github.com/agntcy/shadi
brew install agntcy/shadi/shadictlOn Windows, once the matching WinGet manifest has landed in the default source,
you can install or upgrade shadictl with:
winget install --id AGNTCY.shadictl -e
winget upgrade --id AGNTCY.shadictl -eThe Homebrew formula builds from the published agntcy-shadi-cli release tag.
Published agntcy-shadi-cli releases also include prebuilt archives for Linux
(x86_64 and aarch64), macOS (arm64 and x86_64), and Windows (x86_64).
For unreleased changes or any other host, use the source build flow below.
cargo build --workspace
cargo test --workspace
cargo run -p shadi_demo_bot -- feature-botThe demo bot runs a compact end-to-end check across secrets, memory, sandboxing, and local SLIM messaging.
- Start here: docs/getting_started.md
- System model: docs/architecture.md
- Security model: docs/security.md
- CLI reference: docs/cli.md
- Sandbox and policy details: docs/sandbox.md
- Shell and demo workflows: examples/shell_demo/README.md and examples/shadi_demo_bot/README.md
See CONTRIBUTING.md, CODE_OF_CONDUCT.md, and SECURITY.md.
See LICENSE.md.