Architecture
Zero-Trust Runtime Supervisor
Vallignus enforces identity, policy, and execution constraints on autonomous agents at runtime. Policies are evaluated deterministically with cryptographic audit output suitable for review and attestation.
Control Plane
Policy definitions, identity registries, and audit aggregation. The control plane never touches agent workloads directly. Configuration changes propagate through signed policy bundles with version attestation.
Data Plane
Runtime supervisors deployed alongside agent infrastructure. Each supervisor enforces policies locally with sub-millisecond evaluation latency. No external dependencies during enforcement.
System Overview
┌─────────────────┐ ┌───────────────────┐ ┌────────────────┐
│ Agent Runtime │ ───▶ │ Supervisor Hook │ ───▶ │ Policy Engine │
└─────────────────┘ └───────────────────┘ └────────────────┘
│ │ │
▼ ▼ ▼
┌─────────────────┐ ┌───────────────────┐ ┌────────────────┐
│ Sandbox │ │ Audit Log │ │ ALLOW / DENY │
│ (isolated env) │ │ (hash chain) │ │ (terminated) │
└─────────────────┘ └───────────────────┘ └────────────────┘Runtime Flow
Spawn Request
Agent requests execution context from supervisor
Identity Verification
Cryptographic attestation of agent identity and origin
Policy Bundle Load
Runtime policies loaded and validated against schema
Sandbox Initialization
Isolated execution environment with resource constraints
Runtime Gating
Network, file, and tool access evaluated per-request
Audit + Termination
All actions logged with hash chain; termination on violation
Policy Example
# zero_trust.runtime.v1 [identity] require_attestation = true allowed_issuers = ["internal-ca.vallignus.io"] [network] default = "deny" allow = [ "api.internal.corp:443", "telemetry.vallignus.io:443" ] [filesystem] default = "deny" allow_read = ["/data/agent/*"] allow_write = [] [execution] max_runtime_seconds = 300 terminate_on_policy_violation = true audit_all_actions = true
Guarantees
Deterministic policy evaluation
Deny-by-default posture
Signed audit trail with hash chain
Kill-switch and forced termination controls
No implicit trust inheritance