The open enforcement foundation.
from enforcecore import PolicyEngine, Sandbox
# Load policy
policy = PolicyEngine.from_yaml("policy.yaml")
# Wrap any agent
safe = Sandbox(
agent=my_agent,
policy=policy,
allow_network=["api.openai.com"],
allow_fs=["/tmp/workspace"],
max_cost_usd=5.00,
redact_pii=True
)
# Run — enforced
result = safe.run("Analyze Q3 earnings")One commercial product. Two open-source foundations.
AKIOS Pro is the product this website sells. RADAR and FLUX are Pro capabilities. AKIOS OSS and EnforceCore stay visible as separate open-source proof, not as the AKIOS Pro free tier.
AKIOS Pro
Self-hosted compliance evidence platform for regulated enterprises. It monitors existing stacks and produces governance records.
RADAR and FLUX
RADAR captures trace evidence. FLUX adds operational-risk, cost, and reliability signals inside the AKIOS Pro workflow.
AKIOS OSS
Separate open-source execution cage for AI agents. It is part of the AKIOUD AI family, but it is not AKIOS Pro Free.
EnforceCore
Apache 2.0 enforcement primitives for teams that want low-level policy and sandboxing building blocks.
Built for production workloads.
Sub-millisecond policy evaluation. Kernel-level isolation. Zero runtime dependencies.
- Policy latency
- < 0.5 ms
- Language
- Rust core
- SDK
- Python
- Policy format
- YAML / Rego
- Audit format
- Merkle / JSON
- Sandbox
- Kernel-level
- License
- Apache 2.0
- Deployment
- Library / Sidecar
The enforcement layer that any agent system can use.
Enforcement Primitives
Six foundational primitives that make policy violations structurally impossible at the kernel level.
Policy-as-Code Engine
Kernel Sandboxing
Merkle Audit Trails
PII Redaction Engine
Cost Kill-Switch
Tool Permission Framework
Three lines to enforce.
Works with LangChain, AutoGPT, CrewAI, or any custom orchestrator. No SDK required.
Define constraints in YAML or Rego. Version-control policies like application code.
Every decision is logged to a Merkle tree. Export JSON for compliance audits.
Policies compile to WASM. Evaluation overhead is sub-millisecond at p99.
# policy.yaml
version: "1.0"
rules:
- name: block-financial-advice
match:
output: "regex:you should (buy|sell|invest)"
action: deny
severity: critical
- name: pii-redaction
match:
output: "entity:PERSON|SSN|CREDIT_CARD"
action: redact
- name: cost-limit
match:
token_spend: "> 10000"
action: kill
notify: ops@company.comOpen foundation. Commercial compliance platform.
Foundation
EnforceCore
Open enforcement primitives (Apache 2.0). Use standalone or as the base for AKIOS.
Production
AKIOS Core
Complete runtime (GPL-3.0-only). Adds governance, RADAR observability, FLUX cost control.
Enterprise
AKIOS Pro
Self-hosted compliance platform. RADAR monitoring, FLUX signals, governance checks, team RBAC, SIEM events, and audit evidence exports.
We're opening EnforceCore to the community. If you're building agentic systems and need kernel-level enforcement, contribute or grab a design partner slot.
Design Partner Slot
Open Source · Apache 2.0

Frequently Asked Questions
Need enterprise compliance evidence?
| Compare roles | EnforceCore Free (Apache 2.0) | AKIOS OSS Free (open source) | AKIOS Pro Custom self-hosted |
|---|---|---|---|
| Open-source foundations | |||
| Policy-as-code primitives | Evidence integration | ||
| Execution sandboxing | |||
| Local audit trail primitive | Evidence record | ||
| Standalone open-source use | |||
| Commercial compliance | |||
| RADAR trace evidence | Developer-level | ||
| FLUX operational-risk signals | Developer-level | ||
| Governance workflows | |||
| Evidence packs | |||
| Enterprise adoption | |||
| Team RBAC | |||
| SIEM events | |||
| Custom self-hosted licensing | |||
| SSO / SAML / VPC support | Enterprise | ||
| Open-source foundations | |
|---|---|
| Policy-as-code primitives | |
| Execution sandboxing | |
| Local audit trail primitive | |
| Standalone open-source use | |
| Commercial compliance | |
| RADAR trace evidence | |
| FLUX operational-risk signals | |
| Governance workflows | |
| Evidence packs | |
| Enterprise adoption | |
| Team RBAC | |
| SIEM events | |
| Custom self-hosted licensing | |
| SSO / SAML / VPC support | |
| Open-source foundations | |
|---|---|
| Policy-as-code primitives | |
| Execution sandboxing | |
| Local audit trail primitive | |
| Standalone open-source use | |
| Commercial compliance | |
| RADAR trace evidence | Developer-level |
| FLUX operational-risk signals | Developer-level |
| Governance workflows | |
| Evidence packs | |
| Enterprise adoption | |
| Team RBAC | |
| SIEM events | |
| Custom self-hosted licensing | |
| SSO / SAML / VPC support | |
| Open-source foundations | |
|---|---|
| Policy-as-code primitives | Evidence integration |
| Execution sandboxing | |
| Local audit trail primitive | Evidence record |
| Standalone open-source use | |
| Commercial compliance | |
| RADAR trace evidence | |
| FLUX operational-risk signals | |
| Governance workflows | |
| Evidence packs | |
| Enterprise adoption | |
| Team RBAC | |
| SIEM events | |
| Custom self-hosted licensing | |
| SSO / SAML / VPC support | Enterprise |