RADIUS docs

v0.4.0 · February 18, 2026

RADIUS is a deterministic security layer for AI agents. It sits between your agent framework and the operating system, enforcing filesystem, network, shell, and data constraints with zero LLMs in the loop. Every decision is made by code — regex, allowlists, rate counters — not by asking a model to “please be careful.”

If your agent has shell access, file access, or network access, it needs a guardrail that can’t be prompt-injected. That’s what RADIUS does.



Start here

If you’re using OpenClaw, the fastest path is the OpenClaw Quick Start — it walks you through the golden path from install to live test, including compatibility checks validated on agentradius@0.4.0 (Node 22+ runtime).

For any other framework (or no framework), start with the Generic Quick Start.

For module-level policy design, continue with Modules and Features.


What RADIUS is not


Architecture (30-second version)

Every agent action passes through a module pipeline — an ordered array of security modules. Each module inspects the event and returns one of: allow, deny, modify, challenge, or alert. The pipeline runs in order; the first deny wins.

The 11 modules: kill_switch, skill_scanner, tool_policy, fs_guard, command_guard, exec_sandbox, egress_guard, output_dlp, rate_budget, approval_gate, audit.

Three profiles control how aggressive the pipeline is: local (strict), standard (balanced), unbounded (monitor).

See the Configuration Reference for the full breakdown, then check What’s New for latest changes.