The Zero-Trust Framework for Autonomous AI Agents
Define, schedule, and run AI agents with built-in reasoning loops, policy enforcement, cryptographic identity, and sandboxed execution. Written in Rust.
agent security_scanner(target: Endpoint) -> ScanReport { capabilities = [ "network_scan", "vuln_detection", "report_generation" ] policy security_policy { allow: scan(target) if user.clearance >= "confidential" deny: export(data) if data.contains_pii } memory { store: markdown path: "./data/scanner" retention: 90d } webhook { provider: github secret: $GITHUB_WEBHOOK_SECRET path: "/hooks/scan" } }
Everything You Need to Ship Secure Agents
From declarative DSL definitions to production observability, Symbiont covers the full agent lifecycle.
DSL & Policy Engine
Define agents declaratively with inline policy enforcement. Capabilities, permissions, and security constraints live in the same file.
policy hipaa_compliance { allow: analyze(data) if user.medical_license.valid deny: export(data) if data.contains_identifiers require: [ user.hipaa_training.completed, session.secure_connection, audit_trail = true ] conditions: { data_classification: "medical", retention_period: 7.years } }
Cron Scheduling
First-class cron engine with dead-letter queues, heartbeat monitoring, and ephemeral sessions.
schedule { cron: "0 9 * * *" session_mode: "ephemeral" }
AgentPin Identity
ES256 cryptographic identity anchored to your domain via .well-known. Verify any agent's origin before trusting it.
Session Isolation
Each agent run gets its own sandboxed session. Choose ephemeral, persistent, or ephemeral-with-summary modes per job.
Delivery Routing
Route agent output to stdout, log files, webhooks, or Slack. Multiple delivery targets per job with structured output.
Observability
Prometheus-compatible metrics out of the box. Track run counts, durations, failures, and in-flight jobs.
# Prometheus metrics symbiont_cron_runs_total{ job_name="daily-report", status="succeeded" } 450 symbiont_cron_execution_duration_seconds{ job_name="daily-report" } 1.234 symbiont_cron_in_flight_jobs 3 symbiont_cron_dead_letter_total{ job_name="flaky-job" } 2
RAG & Vector Search
Embedded vector search via LanceDB — no external service required. Semantic retrieval for persistent agent knowledge with optional Qdrant support.
Reasoning Loop
Structured ORGA (Observe–Reason–Ground–Act) cycle with Cedar policy gates, audit journal, circuit breakers, and a knowledge bridge for grounded decisions.
Sandboxed Execution
Docker and gVisor isolation tiers. Agents run in containers with configurable resource limits and network policies.
API Key Auth & Rate Limiting
Per-agent API key authentication with Argon2 hashing. Per-IP rate limiting on the HTTP API via governor.
Sensitive Param Redaction
Schema-driven redaction of sensitive arguments in MCP tool calls. Safe sandbox defaults with no shell access.
Channel Adapters
Bidirectional Slack, Microsoft Teams, and Mattermost integrations for real-time agent-human communication.
Webhook Verification
HMAC-SHA256 and JWT signature verification with built-in presets for GitHub, Stripe, and Slack webhooks.
Persistent Memory
Markdown-backed agent memory with facts, procedures, and learned patterns. Retention-based compaction and daily logs.
Skill Scanning
ClawHavoc scanner detects malicious patterns in agent skills — pipe-to-shell, env exfiltration, base64 exec, and more.
Metrics & Telemetry
Export scheduler, task manager, and system metrics to files or OTLP endpoints. Composite exporters fan out to multiple backends.
HTTP Security Hardening
Loopback-only binding, explicit CORS allow-lists, JWT EdDSA validation, and separated health endpoints.
Context Compaction
Automatic memory pressure management with tiered thresholds — summarize, compress, archive, and truncate context as usage grows.
Composio MCP Integration
Optional MCP tool integration via Composio. Connect agents to 250+ external services with a single API key.
Multi-Model Token Counting
Precise token counting across OpenAI, Anthropic, and OpenRouter models. Accurate context budgeting for compaction and cost tracking.
$ symbi cron list JOB ID NAME AGENT CRON STATUS NEXT RUN cron-001 daily-report reporter-agent 0 9 * * * active 2026-02-08 09:00 cron-002 hourly-metrics metrics-agent 0 * * * * active 2026-02-07 22:00 cron-003 weekly-scan security-scanner 0 0 * * 1 paused — cron-004 backup-nightly backup-agent 0 2 * * * active 2026-02-08 02:00 4 jobs (3 active, 1 paused)
symbi cron add
Register a schedule from DSL
symbi cron run-now
Trigger an immediate run
symbi cron history
View past run results
The ThirdKey Trust Stack
Three layers of cryptographic trust, from tool integrity to agent identity to runtime execution.
SchemaPin
Tool Integrity
Cryptographic verification that the tools an agent calls haven't been tampered with.
- Schema signing & pinning
- DNS-anchored trust
- MCP tool verification
AgentPin
Agent Identity
Domain-anchored ES256 identity for AI agents. Verify who an agent is before you trust it.
- ES256 key pairs
- .well-known discovery
- Identity certificates
Symbiont
Secure Runtime
The execution layer that enforces policies, isolates sessions, and schedules agent work.
- DSL, policy engine & webhooks
- Embedded vector search & compaction
- Memory, scheduling & MCP tools
SchemaPin verifies tools → AgentPin verifies agents → Symbiont enforces everything at runtime
Schedule Agents, Not Scripts
Symbiont's built-in cron engine treats agents as first-class scheduled workloads. Each run gets its own isolated session with policy enforcement and delivery routing.
Heartbeat Monitoring
Automatic health checks detect stuck or failed jobs and trigger alerts.
Dead-Letter Queues
Failed runs are captured with full context for debugging and retry.
Policy Gates
Every scheduled run enforces the agent's policy block before execution.
AgentPin Verify
Scheduled agents are identity-verified via AgentPin before each run.
schedule { name: "daily-report" agent: "reporter-agent" cron: "0 9 * * *" session_mode: "ephemeral_with_summary" delivery: ["stdout", "log_file"] policy { require_approval: false max_runtime: "5m" } }
Built for Critical Applications
From regulated industries to multi-agent platforms, Symbiont provides the foundation for secure AI.
Security & Compliance
HIPAA, SOX, PCI-DSS compatible audit trails. Cryptographic signatures on every agent action. Policy enforcement at the language level.
- Immutable audit logs
- Data classification rules
- Retention policies
DevOps & Automation
Schedule agents for monitoring, reporting, backups, and incident response. Full CLI control with Prometheus metrics.
- Cron-based scheduling
- Webhook delivery
- Container isolation
AI Platforms & Multi-Agent
Run fleets of agents with verified identities, isolated sessions, and centralized observability. Built for multi-tenant deployments.
- AgentPin identity
- Session isolation
- Multi-SDK support
Deploy an Agent Fleet in 5 Minutes
One command gives you a production-ready agent fleet: Docker Compose on your desktop with Google Cloud Run standby for failover and burst capacity.
Desktop-Primary
Coordinator + LanceDB (embedded) + opt-in Litestream via Docker Compose, Cloudflare Tunnel for zero-trust ingress
Cloud-Standby
Google Cloud Run at min-instances=0 (free at idle), scales to 10 workers on demand
Cryptographic Identity
Every agent gets AgentPin ES256 credentials, policy enforcement, and audit logging
$ curl -fsSL https://symbiont.dev/install.sh | bash ┌─────────────────────────────────────────┐ │ symbi-hybrid-stack quick start │ │ Zero to agent fleet in 5 minutes │ └─────────────────────────────────────────┘ >>> Checking prerequisites... git: git version 2.43 docker: Docker version 27.4 compose: Docker Compose v2.32 >>> Cloning symbi-hybrid-stack... >>> Generated auth token. >>> Pulling Docker images... >>> Starting desktop stack... >>> All services healthy. ✓ symbi-hybrid-stack is ready! Your agent fleet is running at: http://localhost:8081
Or install manually:
git clone https://github.com/thirdkeyai/symbi-hybrid-stack.git && cd symbi-hybrid-stack && make init
Get Started in 60 Seconds
Cargo
$ cargo install symbi
Docker
$ docker pull \
ghcr.io/thirdkeyai/symbi:latest
SDK
// JavaScript import { SymbiontClient } from 'symbiont-sdk-js'; # Python pip install symbiont-sdk from symbiont import \ SymbiontClient
Ready to Deploy Secure Agents?
Get started with Symbiont today. Read the documentation or contact us for enterprise support.