Features
RADIUS is designed around deterministic enforcement, transparent decisions, and operational safety for agentic workflows.
Core capabilities
Deterministic policy engine
- Fixed decision model:
allow,deny,modify,challenge,alert - No LLM in the enforcement path
- First-deny-wins pipeline behavior
Multi-layer protection
- Tool identity control (
tool_policy) - Filesystem topology limits (
fs_guard) - Shell payload filtering (
command_guard) - Optional process isolation (
exec_sandbox) - Network egress constraints (
egress_guard) - Output secret controls (
output_dlp)
Human-in-the-loop safety
- Optional
approval_gatefor high-impact actions - Timeout behavior is deterministic (
denyoralert) - Telegram channel support for mobile approvals
Operational observability
- Append-only audit stream with decision context
- File, stdout, webhook, OTLP sink options
- Supports post-incident reconstruction
Runtime resilience
kill_switchemergency stoprate_budgetto prevent runaway loopsskill_scannerto catch malicious skill metadata
CLI workflows
RADIUS ships with practical commands for setup and validation:
npx agentradius init— scaffold policy and framework hooksnpx agentradius doctor— environment and config validationnpx agentradius pentest— adversarial smoke tests against active policynpx agentradius hook— adapter entrypoint for hook events
Profile model
| Profile | Intent | Default action | Typical use |
|---|---|---|---|
local | strict containment | deny | production, credentials, billing systems |
standard | balanced protection | deny | development/staging |
unbounded | observation mode | allow | exploration, migration rehearsal |
Framework integration
OpenClaw
- Generated hook script and hook registry
- PreToolUse/PostToolUse enforcement
- Works with Telegram approvals
Generic mode
- Works without framework lock-in
- Can be called through your own orchestrator path
Security posture summary
RADIUS is strongest when used as:
- fail-closed policy (
defaultAction: deny) - explicit tool allowlisting
- strict filesystem/network constraints
- continuous pentest + audit review
Next docs
- Modules for full module-by-module reference
- Configuration for YAML options
- What’s New for latest updates and migration notes