Skip to content

Symbiont: A Rust-native, zero-trust agent framework with cryptographic audit trails.

License

Notifications You must be signed in to change notification settings

ThirdKeyAI/Symbiont

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

102 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Symbi

中文简体 | Español | Português | 日本語 | Deutsch

Build Crates.io License: MIT Docs


🚀 What is Symbiont?

Symbi is a Rust-native, zero-trust agent framework for building autonomous, policy-aware AI agents. It fixes the biggest flaws in existing frameworks like LangChain and AutoGPT by focusing on:

  • Security-first: cryptographic audit trails, enforced policies, and sandboxing.
  • Zero trust: all inputs are treated as untrusted by default.
  • Enterprise-grade compliance: designed for regulated industries (HIPAA, SOC2, finance).

Symbiont agents collaborate safely with humans, tools, and LLMs — without sacrificing security or performance.


⚡ Why Symbiont?

Feature Symbiont LangChain AutoGPT
Language Rust (safety, performance) Python Python
Security Zero-trust, cryptographic audit Minimal None
Policy Engine Built-in DSL Limited None
Deployment REPL, Docker, HTTP API Python scripts CLI hacks
Audit Trails Cryptographic logs No No

🏁 Quick Start

Prerequisites

  • Docker (recommended) or Rust 1.88+
  • Qdrant vector database (for semantic search)

Run with Pre-Built Containers

# Parse an agent DSL file
docker run --rm -v $(pwd):/workspace ghcr.io/thirdkeyai/symbi:latest dsl parse /workspace/agent.dsl

# Run MCP Server
docker run --rm -p 8080:8080 ghcr.io/thirdkeyai/symbi:latest mcp

# Interactive development shell
docker run --rm -it -v $(pwd):/workspace ghcr.io/thirdkeyai/symbi:latest bash

Build from Source

# Build dev environment
docker build -t symbi:latest .
docker run --rm -it -v $(pwd):/workspace symbi:latest bash

# Build unified binary
cargo build --release

# Run REPL
cargo run -- repl

# Parse DSL & run MCP
cargo run -- dsl parse my_agent.dsl
cargo run -- mcp --port 8080

🔧 Key Features

  • DSL Grammar – Define agents declaratively with built-in security policies, memory, webhook, schedule, and channel blocks.
  • Agent Runtime – Task scheduling, resource management, and lifecycle control.
  • Cron Scheduling – Persistent SQLite-backed cron engine with jitter, concurrency guards, dead-letter queues, and heartbeat pattern.
  • 🧠 Persistent Memory – Markdown-backed agent memory with facts, procedures, learned patterns, daily logs, and retention-based compaction.
  • 🪝 Webhook Verification – HMAC-SHA256 and JWT signature verification with GitHub, Stripe, and Slack presets.
  • 🛡️ Skill Scanning – ClawHavoc scanner with 10 rules detecting pipe-to-shell, env exfiltration, identity tampering, eval+fetch, and more.
  • 📈 Metrics & Telemetry – File and OTLP metric exporters with composite fan-out and background collection.
  • 🔒 HTTP Security Hardening – Loopback-only binding, CORS allow-lists, JWT EdDSA validation, health endpoint separation.
  • 🔒 Sandboxing – Tier-1 Docker isolation for agent execution.
  • 🔒 SchemaPin Security – Cryptographic verification of tools and schemas.
  • 🔒 AgentPin Identity – Domain-anchored cryptographic identity for scheduled agents.
  • 🔒 Secrets Management – HashiCorp Vault / OpenBao integration, AES-256-GCM encrypted storage.
  • 🔑 Per-Agent API Keys – Argon2-hashed API key authentication with per-IP rate limiting.
  • 📊 RAG Engine – Vector search (Qdrant) with hybrid semantic + keyword retrieval.
  • 🧩 MCP Integration – Native support for Model Context Protocol tools.
  • 📡 Optional HTTP API – Feature-gated REST interface for external integration.
  • 📋 Delivery Routing – Route scheduled agent output to webhooks, Slack, email, or custom channels.

📦 Workspace Crates

Crate Description Status
symbi Unified CLI binary Stable
symbi-runtime Core agent runtime Stable
symbi-dsl DSL parser and evaluator Stable
symbi-channel-adapter Slack/Teams/Mattermost adapters Stable
repl-core REPL engine Stable
repl-proto JSON-RPC protocol Stable
repl-cli Interactive CLI + JSON-RPC server Stable
repl-lsp Language Server Protocol Stable
symbi-a2ui Admin dashboard (Lit/TypeScript) Alpha

📐 Symbiont DSL Example

metadata {
    version = "1.0.0"
    author = "Your Name"
    description = "Data analysis agent"
}

agent analyze_data(input: DataSet) -> Result {
    capabilities = ["data_analysis", "visualization"]
    
    policy data_privacy {
        allow: read(input) if input.anonymized == true
        deny: store(input) if input.contains_pii == true
        audit: all_operations
    }
    
    with memory = "persistent", requires = "approval" {
        if (llm_check_safety(input)) {
            result = analyze(input);
            return result;
        } else {
            return reject("Safety check failed");
        }
    }
}

🔒 Security Model

  • Zero Trust – all agent inputs are untrusted by default.
  • Sandboxed Execution – Docker-based containment for processes.
  • Audit Logging – Cryptographically tamper-evident logs.
  • Secrets Control – Vault/OpenBao backends, encrypted local storage, agent namespaces.

📚 Documentation


🎯 Use Cases

  • Development & Automation

    • Secure code generation & refactoring.
    • AI agent deployment with enforced policies.
    • Knowledge management with semantic search.
  • Enterprise & Regulated Industries

    • Healthcare (HIPAA-compliant processing).
    • Finance (audit-ready workflows).
    • Government (classified context handling).
    • Legal (confidential document analysis).

📄 License

  • Community Edition: MIT License
  • Enterprise Edition: Commercial license required

Contact ThirdKey for enterprise licensing.


Symbiont enables secure collaboration between AI agents and humans through intelligent policy enforcement, cryptographic verification, and comprehensive audit trails.

Symbi Logo

About

Symbiont: A Rust-native, zero-trust agent framework with cryptographic audit trails.

Topics

Resources

License

Code of conduct

Contributing

Security policy

Stars

Watchers

Forks

Packages

 
 
 

Contributors 2

  •  
  •