Modules

RADIUS enforces security through an ordered module pipeline. Every event passes through the same deterministic path. No module asks an LLM to decide whether an action is safe.


  1. kill_switch
  2. skill_scanner
  3. tool_policy
  4. fs_guard
  5. command_guard
  6. exec_sandbox
  7. egress_guard
  8. output_dlp
  9. rate_budget
  10. approval_gate
  11. audit

If multiple modules could block the same action, the first deny in pipeline order wins.


Module matrix

ModulePrimary purposeTypical decisionDeep dive
kill_switchEmergency hard stopdenyOpen
skill_scannerDetect malicious skill payloadschallenge / denyOpen
tool_policyAllow/deny by tool identityallow / denyOpen
fs_guardRestrict filesystem topologydenyOpen
command_guardBlock dangerous shell patternsdenyOpen
exec_sandboxIsolate command executionmodify / denyOpen
egress_guardControl outbound networkdenyOpen
output_dlpStop secret leakage in outputredact / denyOpen
rate_budgetCap tool-call velocitydenyOpen
approval_gateHuman-in-the-loop approvalchallengeOpen
auditAppend-only event trailalert (log only)Open

Deep-dive pages


PostureGoalNotes
localMaximum containmentexec_sandbox required, strict deny
standardDaily development safetyBalanced deny + redact + challenge
unboundedResearch/observation modeMostly allow, keep audit on

Start with standard, move to local before production access to sensitive systems.