01Persistent, escalation-only agent state model (active, monitoring, approval_required, suspended, killed)
02Policy-driven controls including rate limits, spend limits, and secret exposure checks
03Four-layer security architecture with 20 specialized tools for comprehensive runtime enforcement
04Cryptographically auditable decisions and a persistent audit trail with caller identity and HMAC signatures
050 GitHub stars
06Comprehensive post-execution output scanning for PII, secrets, exfiltration, and tool poisoning