Skip to content

Proposal: Agent OS — Governance Kernel for AI Agents (Sandbox)#102

Closed
imran-siddique wants to merge 2 commits into
lfai:masterfrom
imran-siddique:proposal/agent-os-sandbox
Closed

Proposal: Agent OS — Governance Kernel for AI Agents (Sandbox)#102
imran-siddique wants to merge 2 commits into
lfai:masterfrom
imran-siddique:proposal/agent-os-sandbox

Conversation

@imran-siddique
Copy link
Copy Markdown

Project Proposal: Agent OS — Governance Kernel for Autonomous AI Agents

Requested Level: Sandbox

Summary

Agent OS is an open-source governance kernel for autonomous AI agents providing runtime policy enforcement, capability sandboxing, inter-agent trust verification, and kill-switch controls.

The ecosystem consists of 5 interoperating packages:

  • Agent OS — Core governance kernel (policy engine, capability sandbox, VFS)
  • Agent Mesh — Inter-agent trust layer (DID identity, IATP protocol)
  • Agent Hypervisor — Execution isolation (ring model, kill switch)
  • Agent SRE — Observability & reliability (circuit breakers, anomaly detection)
  • Agent Governance — Meta-framework & compliance mapping

Key Metrics

  • 82+ GitHub stars, 30+ forks across 5 repos
  • 9,400+ clones in 14 days
  • 5 PyPI packages published
  • MCP server on npm + Glama listing
  • 9/10 OWASP Agentic Top 10 risks covered
  • 4 external contributors
  • All repos: MIT license, CI/CD, branch protection, code of conduct

Alignment with LF AI Mission

As AI agents become increasingly autonomous, governance infrastructure is critical for safe deployment. Agent OS provides this as a neutral, open-source project — preventing vendor lock-in and enabling a shared governance standard.

Links

@imran-siddique
Copy link
Copy Markdown
Author

Migration update: This project has officially moved to microsoft/agent-governance-toolkit under the Microsoft org.

The code in this PR has been updated to reference the new location. Install via:

pip install ai-agent-compliance

All old personal repos (imran-siddique/agent-os, agent-mesh, etc.) are archived and redirect to the new repo. Happy to address any review feedback!

@imran-siddique
Copy link
Copy Markdown
Author

Closing — this project has moved to microsoft/agent-governance-toolkit. Will re-submit fresh proposals from the Microsoft repo. Thank you!

imran-siddique added a commit to microsoft/agent-governance-toolkit that referenced this pull request Apr 20, 2026
- AAIF: Updated from closed aaif/technical-committee#1 to The-AI-Alliance/community#58
- LF AI: Updated from closed lfai/proposing-projects#102 to new #104

Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
imran-siddique added a commit to imran-siddique/agent-governance-toolkit that referenced this pull request Apr 20, 2026
- AAIF: Updated from closed aaif/technical-committee#1 to The-AI-Alliance/community#58
- LF AI: Updated from closed lfai/proposing-projects#102 to new microsoft#104

Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
imran-siddique added a commit to microsoft/agent-governance-toolkit that referenced this pull request Apr 20, 2026
* docs: update AAIF and LF AI proposal links to active submissions

- AAIF: Updated from closed aaif/technical-committee#1 to The-AI-Alliance/community#58
- LF AI: Updated from closed lfai/proposing-projects#102 to new #104

Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>

* feat(e2e): Double Ratchet for per-message forward secrecy (#1223)

Implements the Signal Double Ratchet algorithm on top of X3DH shared
secrets for E2E encrypted agent messaging with forward secrecy and
post-compromise security.

New files:
- agentmesh/encryption/ratchet.py — Double Ratchet implementation
  - DoubleRatchet (init_sender/init_receiver, encrypt/decrypt)
  - DH ratchet step on conversation turn change (X25519)
  - Symmetric chain ratchet (HMAC-SHA256)
  - ChaCha20-Poly1305 message encryption
  - Skipped message key caching (configurable max)
  - Serializable RatchetState (to_dict/from_dict)
  - MessageHeader and EncryptedMessage with serialization
- tests/test_ratchet.py — 18 tests covering:
  - Single message, multi-message, bidirectional conversation
  - Forward secrecy (different keys per message)
  - DH ratchet advances on turn change
  - Out-of-order message delivery
  - Max skip enforcement
  - Tampered ciphertext rejection
  - Associated data authentication
  - State serialization roundtrip + session resumption

Uses only existing deps: PyNaCl + cryptography.

Closes #1223

Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>

---------

Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
@imran-siddique
Copy link
Copy Markdown
Author

Correction (May 2026): For the record, this early proposal listed "4 external contributors" as a key metric. Those individuals were community contributors, not maintainers. The project's current maintainers are Imran Siddique, Jack Batzner, and Elton Carr, all Microsoft. The active proposal is now at PR #104 with corrected information. This project also uses AI-assisted development tools (GitHub Copilot, Claude); all AI-generated code is human-reviewed before merge.

imran-siddique added a commit to imran-siddique/agent-governance-toolkit that referenced this pull request May 4, 2026
…rosoft#1229)

- AAIF: Updated from closed aaif/technical-committee#1 to The-AI-Alliance/community#58
- LF AI: Updated from closed lfai/proposing-projects#102 to new microsoft#104

Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
imran-siddique added a commit to imran-siddique/agent-governance-toolkit that referenced this pull request May 4, 2026
…1230)

* docs: update AAIF and LF AI proposal links to active submissions

- AAIF: Updated from closed aaif/technical-committee#1 to The-AI-Alliance/community#58
- LF AI: Updated from closed lfai/proposing-projects#102 to new microsoft#104

Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>

* feat(e2e): Double Ratchet for per-message forward secrecy (microsoft#1223)

Implements the Signal Double Ratchet algorithm on top of X3DH shared
secrets for E2E encrypted agent messaging with forward secrecy and
post-compromise security.

New files:
- agentmesh/encryption/ratchet.py — Double Ratchet implementation
  - DoubleRatchet (init_sender/init_receiver, encrypt/decrypt)
  - DH ratchet step on conversation turn change (X25519)
  - Symmetric chain ratchet (HMAC-SHA256)
  - ChaCha20-Poly1305 message encryption
  - Skipped message key caching (configurable max)
  - Serializable RatchetState (to_dict/from_dict)
  - MessageHeader and EncryptedMessage with serialization
- tests/test_ratchet.py — 18 tests covering:
  - Single message, multi-message, bidirectional conversation
  - Forward secrecy (different keys per message)
  - DH ratchet advances on turn change
  - Out-of-order message delivery
  - Max skip enforcement
  - Tampered ciphertext rejection
  - Associated data authentication
  - State serialization roundtrip + session resumption

Uses only existing deps: PyNaCl + cryptography.

Closes microsoft#1223

Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>

---------

Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant