Cadence: the resource-oriented smart contract programming language of the Flow network. Capability-based security, type safety, and move semantics
-
Updated
Apr 23, 2026 - Go
Cadence: the resource-oriented smart contract programming language of the Flow network. Capability-based security, type safety, and move semantics
Compile-time capability-based security for Rust
Unified AI execution runtime for coding agents across CLI, VS Code, terminal, and web surfaces. Rust frame work, programmable capabilites.
Decentralized Agentic OS — sandboxed WASM agents with capability-based security over Cap'n Proto RPC
InferNode is a security-focused 64-bit Inferno® OS (ARM64/AMD64) for embedded systems, servers, and AI agents. GPL-free, headless-capable, with 280+ utilities and 9P filesystem protocol. Providing a namespace-based alternative to MCP servers. Namespace-bounded security has been formally verified.
The markdown coordination layer for agents. One readable timeline where agents claim tasks, post results, and hand off work. You see everything. They never duplicate work.
An agent-first runtime where AI agents are native processes, capabilities replace permissions, and the system is designed for autonomy — not human interaction.
Aster RPC -- peer-to-peer RPC framework with identity in the connection. Machines authenticate to machines, on behalf of users. Built on iroh QUIC + Apache Fory + capability-based credentials.
A local-first WebAssembly sandbox runtime with capability-based security
A data-driven, cryptographically signed, registry-backed AI operating system, with capability-scoped execution and graph-executable workflows — living inside your projects, running through a recursive MCP that goes as deep as you dare.
Secure-execution domain repository providing modular runtime-security components for sandboxing, capability enforcement, cryptographic isolation, audit logging, and policy-driven execution control — designed for building hardened application and infrastructure runtimes.
Deterministic, auditable, capability-safe autonomous agent framework in Rust. Event-sourced, replayable, with governed self-evolution.
Capability-based authorization and policy enforcement for agents using large MCP and A2A tool ecosystems.
Rust microkernel for GPU-isolated AI inference
AIP conformance validator and IBCT chain auditor. Tracks draft-prakash-aip-00.
Sovereign and generative — no telemetry, user owns keys and data. Zero-trust, capability-based Rust microkernel targeting formal verification. Tri-arch (x86_64 / AArch64 / RISC-V). Early-stage — see STATUS.md. Inspired by seL4, Hubris, and Redox.
Semantic substrate for programming languages
Coordinate AI agents and humans with a shared markdown timeline that tracks tasks, results, and handoffs to prevent duplication and data loss.
VAC Protocol - Capability-based security for AI agents. Task-scoped credentials, receipt-based state, instant revocation.
🛡️ WASI 0.2 security simulation: A data diode runtime that allows sensor reads but blocks network exfiltration. Built with Rust, Leptos, and the Component Model
Add a description, image, and links to the capability-based-security topic page so that developers can more easily learn about it.
To associate your repository with the capability-based-security topic, visit your repo's landing page and select "manage topics."