🛡️ Enforce filesystem and network restrictions on processes with a lightweight sandboxing tool, enabling safer AI agent behavior at the OS level.
-
Updated
Feb 6, 2026 - TypeScript
🛡️ Enforce filesystem and network restrictions on processes with a lightweight sandboxing tool, enabling safer AI agent behavior at the OS level.
Horizontally scalable, highly available, key-value storage service with distributed transaction support written in C++
K.I.S.S. LSM-tree implementation in safe Rust
Runtime Security Enforcement System. Workload hardening/sandboxing and implementing least-permissive policies made easy leveraging LSMs (LSM-BPF, AppArmor).
Runtime Security & Alignment Layer for Autonomous AI Agents. eBPF-based sandbox with DEFCON threat levels and Cgroup isolation.
real linux protection using real linux prevention
eBPF Security Monitoring Agent Based on Aya
My local AppArmor profiles for apps that can use those
A closed-loop security runtime preventing "The Great Exfiltration" and Indirect Prompt Injection in Autonomous AI Agents.
🗻 Log-structured, embeddable key-value storage engine written in Rust
Deep Learning project for time-series risk prediction using an LSTM neural network. End-to-end pipeline from preprocessing to evaluation on the Jena Climate dataset.
vArmor is a cloud native container sandbox system based on AppArmor/BPF/Seccomp. It also includes multiple built-in protection rules that are ready to use out of the box.
micromize is a security hardening tool designed to detect and break the post-exploit kill chain for containerized applications, leveraging BPF LSM.
Manage your Linux servers on the go! LSM is a Flutter-based mobile app providing a user-friendly interface for system monitoring and administration over SSH
Add a description, image, and links to the lsm topic page so that developers can more easily learn about it.
To associate your repository with the lsm topic, visit your repo's landing page and select "manage topics."