Modules

RADIUS enforces security through an ordered module pipeline. Every event passes through the same deterministic path. No module asks an LLM to decide whether an action is safe.


  1. kill_switch
  2. skill_scanner
  3. tool_policy
  4. fs_guard
  5. command_guard
  6. exec_sandbox
  7. egress_guard
  8. output_dlp
  9. rate_budget
  10. approval_gate
  11. audit

If multiple modules could block the same action, the first deny in pipeline order wins.

Profile defaults are a subset of this full order (standard and unbounded start without egress_guard and approval_gate).


Optional hardening modules (v0.5+)

These modules are opt-in. Existing v0.4.x configs continue to work unchanged.


Module matrix

ModulePrimary purposeTypical decisionDefaultDeep dive
kill_switchEmergency hard stopdenyonOpen
skill_scannerDetect malicious skill payloadschallenge / denyonOpen
tool_policyAllow/deny by tool identityallow / denyonOpen
self_defenseImmutable config/control-plane protectiondenyoptionalOpen
fs_guardRestrict filesystem topologydenyonOpen
tripwire_guardHoneytoken tripwires in files/envdeny / alertoptionalOpen
command_guardBlock dangerous shell patternsdenyonOpen
exec_sandboxIsolate command executionmodify / denyonOpen
egress_guardControl outbound networkdenyprofile-dependentOpen
output_dlpStop secret leakage in outputredact / denyonOpen
rate_budgetCap tool-call velocitydenyonOpen
repetition_guardDetect identical repeated tool callsdeny / alertoptionalOpen
verdict_providerExternal deterministic verdict inputdeny / allowoptionalOpen
approval_gateHuman-in-the-loop approvalchallengeoptionalOpen
auditAppend-only event trailalert (log only)onOpen

Deep-dive pages


PostureGoalNotes
localMaximum containmentexec_sandbox required, strict deny
standardDaily development safetyBalanced deny + redact + challenge
unboundedResearch/observation modeMostly allow, keep audit on

Start with standard, move to local before production access to sensitive systems.