The Zero-Trust Framework for Autonomous AI Agents

Define, schedule, and run AI agents with built-in reasoning loops, policy enforcement, cryptographic identity, and sandboxed execution. Written in Rust.

$ cargo install symbi
agent.symbi
agent security_scanner(target: Endpoint) -> ScanReport {
    capabilities = [
        "network_scan",
        "vuln_detection",
        "report_generation"
    ]

    policy security_policy {
        allow: scan(target) if user.clearance >= "confidential"
        deny: export(data) if data.contains_pii
    }

    memory {
        store: markdown
        path: "./data/scanner"
        retention: 90d
    }

    webhook {
        provider: github
        secret: $GITHUB_WEBHOOK_SECRET
        path: "/hooks/scan"
    }
}
ES256
Cryptographic Identity
Rust-Native
Memory-Safe Runtime
Cron Engine
Built-in Scheduling
6 Languages
SDK Support
crates.io
Published Package
MIT License
Open Source

Everything You Need to Ship Secure Agents

From declarative DSL definitions to production observability, Symbiont covers the full agent lifecycle.

DSL & Policy Engine

Define agents declaratively with inline policy enforcement. Capabilities, permissions, and security constraints live in the same file.

policy hipaa_compliance {
    allow: analyze(data)
        if user.medical_license.valid
    deny: export(data)
        if data.contains_identifiers
    require: [
        user.hipaa_training.completed,
        session.secure_connection,
        audit_trail = true
    ]
    conditions: {
        data_classification: "medical",
        retention_period: 7.years
    }
}

Cron Scheduling

First-class cron engine with dead-letter queues, heartbeat monitoring, and ephemeral sessions.

schedule {
  cron: "0 9 * * *"
  session_mode: "ephemeral"
}

AgentPin Identity

ES256 cryptographic identity anchored to your domain via .well-known. Verify any agent's origin before trusting it.

Session Isolation

Each agent run gets its own sandboxed session. Choose ephemeral, persistent, or ephemeral-with-summary modes per job.

Delivery Routing

Route agent output to stdout, log files, webhooks, or Slack. Multiple delivery targets per job with structured output.

Observability

Prometheus-compatible metrics out of the box. Track run counts, durations, failures, and in-flight jobs.

# Prometheus metrics
symbiont_cron_runs_total{
  job_name="daily-report",
  status="succeeded"
} 450

symbiont_cron_execution_duration_seconds{
  job_name="daily-report"
} 1.234

symbiont_cron_in_flight_jobs 3

symbiont_cron_dead_letter_total{
  job_name="flaky-job"
} 2

RAG & Vector Search

Embedded vector search via LanceDB — no external service required. Semantic retrieval for persistent agent knowledge with optional Qdrant support.

Reasoning Loop

Structured ORGA (Observe–Reason–Ground–Act) cycle with Cedar policy gates, audit journal, circuit breakers, and a knowledge bridge for grounded decisions.

Sandboxed Execution

Docker and gVisor isolation tiers. Agents run in containers with configurable resource limits and network policies.

API Key Auth & Rate Limiting

Per-agent API key authentication with Argon2 hashing. Per-IP rate limiting on the HTTP API via governor.

Sensitive Param Redaction

Schema-driven redaction of sensitive arguments in MCP tool calls. Safe sandbox defaults with no shell access.

Channel Adapters

Bidirectional Slack, Microsoft Teams, and Mattermost integrations for real-time agent-human communication.

Webhook Verification

HMAC-SHA256 and JWT signature verification with built-in presets for GitHub, Stripe, and Slack webhooks.

Persistent Memory

Markdown-backed agent memory with facts, procedures, and learned patterns. Retention-based compaction and daily logs.

Skill Scanning

ClawHavoc scanner detects malicious patterns in agent skills — pipe-to-shell, env exfiltration, base64 exec, and more.

Metrics & Telemetry

Export scheduler, task manager, and system metrics to files or OTLP endpoints. Composite exporters fan out to multiple backends.

HTTP Security Hardening

Loopback-only binding, explicit CORS allow-lists, JWT EdDSA validation, and separated health endpoints.

Context Compaction

Automatic memory pressure management with tiered thresholds — summarize, compress, archive, and truncate context as usage grows.

Composio MCP Integration

Optional MCP tool integration via Composio. Connect agents to 250+ external services with a single API key.

Multi-Model Token Counting

Precise token counting across OpenAI, Anthropic, and OpenRouter models. Accurate context budgeting for compaction and cost tracking.

terminal
$ symbi cron list

JOB ID       NAME             AGENT             CRON          STATUS    NEXT RUN
cron-001     daily-report     reporter-agent    0 9 * * *     active    2026-02-08 09:00
cron-002     hourly-metrics   metrics-agent     0 * * * *     active    2026-02-07 22:00
cron-003     weekly-scan      security-scanner  0 0 * * 1     paused
cron-004     backup-nightly   backup-agent      0 2 * * *     active    2026-02-08 02:00

4 jobs (3 active, 1 paused)
symbi cron add

Register a schedule from DSL

symbi cron run-now

Trigger an immediate run

symbi cron history

View past run results

The ThirdKey Trust Stack

Three layers of cryptographic trust, from tool integrity to agent identity to runtime execution.

SchemaPin

Tool Integrity

Cryptographic verification that the tools an agent calls haven't been tampered with.

  • Schema signing & pinning
  • DNS-anchored trust
  • MCP tool verification

AgentPin

Agent Identity

Domain-anchored ES256 identity for AI agents. Verify who an agent is before you trust it.

  • ES256 key pairs
  • .well-known discovery
  • Identity certificates

Symbiont

Secure Runtime

The execution layer that enforces policies, isolates sessions, and schedules agent work.

  • DSL, policy engine & webhooks
  • Embedded vector search & compaction
  • Memory, scheduling & MCP tools

SchemaPin verifies tools → AgentPin verifies agents → Symbiont enforces everything at runtime

Schedule Agents, Not Scripts

Symbiont's built-in cron engine treats agents as first-class scheduled workloads. Each run gets its own isolated session with policy enforcement and delivery routing.

Heartbeat Monitoring

Automatic health checks detect stuck or failed jobs and trigger alerts.

Dead-Letter Queues

Failed runs are captured with full context for debugging and retry.

Policy Gates

Every scheduled run enforces the agent's policy block before execution.

AgentPin Verify

Scheduled agents are identity-verified via AgentPin before each run.

schedule.symbi
schedule {
  name: "daily-report"
  agent: "reporter-agent"
  cron: "0 9 * * *"

  session_mode: "ephemeral_with_summary"
  delivery: ["stdout", "log_file"]

  policy {
    require_approval: false
    max_runtime: "5m"
  }
}

Built for Critical Applications

From regulated industries to multi-agent platforms, Symbiont provides the foundation for secure AI.

Security & Compliance

HIPAA, SOX, PCI-DSS compatible audit trails. Cryptographic signatures on every agent action. Policy enforcement at the language level.

  • Immutable audit logs
  • Data classification rules
  • Retention policies

DevOps & Automation

Schedule agents for monitoring, reporting, backups, and incident response. Full CLI control with Prometheus metrics.

  • Cron-based scheduling
  • Webhook delivery
  • Container isolation

AI Platforms & Multi-Agent

Run fleets of agents with verified identities, isolated sessions, and centralized observability. Built for multi-tenant deployments.

  • AgentPin identity
  • Session isolation
  • Multi-SDK support
symbi-hybrid-stack

Deploy an Agent Fleet in 5 Minutes

One command gives you a production-ready agent fleet: Docker Compose on your desktop with Google Cloud Run standby for failover and burst capacity.

Desktop-Primary

Coordinator + LanceDB (embedded) + opt-in Litestream via Docker Compose, Cloudflare Tunnel for zero-trust ingress

Cloud-Standby

Google Cloud Run at min-instances=0 (free at idle), scales to 10 workers on demand

Cryptographic Identity

Every agent gets AgentPin ES256 credentials, policy enforcement, and audit logging

terminal
$ curl -fsSL https://symbiont.dev/install.sh | bash

  ┌─────────────────────────────────────────┐
  │     symbi-hybrid-stack quick start      │
  │     Zero to agent fleet in 5 minutes    │
  └─────────────────────────────────────────┘

>>> Checking prerequisites...
  git:     git version 2.43
  docker:  Docker version 27.4
  compose: Docker Compose v2.32

>>> Cloning symbi-hybrid-stack...
>>> Generated auth token.
>>> Pulling Docker images...
>>> Starting desktop stack...
>>> All services healthy.

  ✓ symbi-hybrid-stack is ready!

  Your agent fleet is running at: http://localhost:8081

Or install manually:

git clone https://github.com/thirdkeyai/symbi-hybrid-stack.git && cd symbi-hybrid-stack && make init

Get Started in 60 Seconds

Cargo

$ cargo install symbi

Docker

$ docker pull \
  ghcr.io/thirdkeyai/symbi:latest

SDK

// JavaScript
import { SymbiontClient }
  from 'symbiont-sdk-js';

# Python
pip install symbiont-sdk
from symbiont import \
  SymbiontClient

Ready to Deploy Secure Agents?

Get started with Symbiont today. Read the documentation or contact us for enterprise support.