中文简体 | Español | Português | 日本語 | Deutsch
Symbi is a Rust-native, zero-trust agent framework for building autonomous, policy-aware AI agents. It fixes the biggest flaws in existing frameworks like LangChain and AutoGPT by focusing on:
- Security-first: cryptographic audit trails, enforced policies, and sandboxing.
- Zero trust: all inputs are treated as untrusted by default.
- Enterprise-grade compliance: designed for regulated industries (HIPAA, SOC2, finance).
Symbiont agents collaborate safely with humans, tools, and LLMs — without sacrificing security or performance.
| Feature | Symbiont | LangChain | AutoGPT |
|---|---|---|---|
| Language | Rust (safety, performance) | Python | Python |
| Security | Zero-trust, cryptographic audit | Minimal | None |
| Policy Engine | Built-in DSL | Limited | None |
| Deployment | REPL, Docker, HTTP API | Python scripts | CLI hacks |
| Audit Trails | Cryptographic logs | No | No |
- Docker (recommended) or Rust 1.88+
- Qdrant vector database (for semantic search)
# Parse an agent DSL file
docker run --rm -v $(pwd):/workspace ghcr.io/thirdkeyai/symbi:latest dsl parse /workspace/agent.dsl
# Run MCP Server
docker run --rm -p 8080:8080 ghcr.io/thirdkeyai/symbi:latest mcp
# Interactive development shell
docker run --rm -it -v $(pwd):/workspace ghcr.io/thirdkeyai/symbi:latest bash# Build dev environment
docker build -t symbi:latest .
docker run --rm -it -v $(pwd):/workspace symbi:latest bash
# Build unified binary
cargo build --release
# Run REPL
cargo run -- repl
# Parse DSL & run MCP
cargo run -- dsl parse my_agent.dsl
cargo run -- mcp --port 8080- ✅ DSL Grammar – Define agents declaratively with built-in security policies,
memory,webhook,schedule, andchannelblocks. - ✅ Agent Runtime – Task scheduling, resource management, and lifecycle control.
- ⏰ Cron Scheduling – Persistent SQLite-backed cron engine with jitter, concurrency guards, dead-letter queues, and heartbeat pattern.
- 🧠 Persistent Memory – Markdown-backed agent memory with facts, procedures, learned patterns, daily logs, and retention-based compaction.
- 🪝 Webhook Verification – HMAC-SHA256 and JWT signature verification with GitHub, Stripe, and Slack presets.
- 🛡️ Skill Scanning – ClawHavoc scanner with 10 rules detecting pipe-to-shell, env exfiltration, identity tampering, eval+fetch, and more.
- 📈 Metrics & Telemetry – File and OTLP metric exporters with composite fan-out and background collection.
- 🔒 HTTP Security Hardening – Loopback-only binding, CORS allow-lists, JWT EdDSA validation, health endpoint separation.
- 🔒 Sandboxing – Tier-1 Docker isolation for agent execution.
- 🔒 SchemaPin Security – Cryptographic verification of tools and schemas.
- 🔒 AgentPin Identity – Domain-anchored cryptographic identity for scheduled agents.
- 🔒 Secrets Management – HashiCorp Vault / OpenBao integration, AES-256-GCM encrypted storage.
- 🔑 Per-Agent API Keys – Argon2-hashed API key authentication with per-IP rate limiting.
- 📊 RAG Engine – Vector search (Qdrant) with hybrid semantic + keyword retrieval.
- 🧩 MCP Integration – Native support for Model Context Protocol tools.
- 📡 Optional HTTP API – Feature-gated REST interface for external integration.
- 📋 Delivery Routing – Route scheduled agent output to webhooks, Slack, email, or custom channels.
| Crate | Description | Status |
|---|---|---|
symbi |
Unified CLI binary | Stable |
symbi-runtime |
Core agent runtime | Stable |
symbi-dsl |
DSL parser and evaluator | Stable |
symbi-channel-adapter |
Slack/Teams/Mattermost adapters | Stable |
repl-core |
REPL engine | Stable |
repl-proto |
JSON-RPC protocol | Stable |
repl-cli |
Interactive CLI + JSON-RPC server | Stable |
repl-lsp |
Language Server Protocol | Stable |
symbi-a2ui |
Admin dashboard (Lit/TypeScript) | Alpha |
metadata {
version = "1.0.0"
author = "Your Name"
description = "Data analysis agent"
}
agent analyze_data(input: DataSet) -> Result {
capabilities = ["data_analysis", "visualization"]
policy data_privacy {
allow: read(input) if input.anonymized == true
deny: store(input) if input.contains_pii == true
audit: all_operations
}
with memory = "persistent", requires = "approval" {
if (llm_check_safety(input)) {
result = analyze(input);
return result;
} else {
return reject("Safety check failed");
}
}
}
- Zero Trust – all agent inputs are untrusted by default.
- Sandboxed Execution – Docker-based containment for processes.
- Audit Logging – Cryptographically tamper-evident logs.
- Secrets Control – Vault/OpenBao backends, encrypted local storage, agent namespaces.
-
Development & Automation
- Secure code generation & refactoring.
- AI agent deployment with enforced policies.
- Knowledge management with semantic search.
-
Enterprise & Regulated Industries
- Healthcare (HIPAA-compliant processing).
- Finance (audit-ready workflows).
- Government (classified context handling).
- Legal (confidential document analysis).
- Community Edition: MIT License
- Enterprise Edition: Commercial license required
Contact ThirdKey for enterprise licensing.
Symbiont enables secure collaboration between AI agents and humans through intelligent policy enforcement, cryptographic verification, and comprehensive audit trails.

