Admina — governed AI development framework
Project description
Admina — Governed AI Development Framework
Install once, get governed AI. The open framework for building AI applications that are governed by design.
Admina gives you an SDK, a transparent proxy, a plugin system, a CLI, and a dashboard — all in one install. Every AI interaction is governed: PII redacted, injections blocked, loops broken, actions audited, EU AI Act compliance tracked. Works in-process (SDK) and over the network (proxy). Zero code changes to add governance to existing applications.
⚖️ Compliance disclaimer. Admina is a self-assessment and defense-in-depth tool. The EU AI Act gap-analysis and risk classification features are decision-support aids, not legal advice. They do not replace the conformity assessment required under EU AI Act Art. 43 for high-risk systems, nor the involvement of a notified body where the regulation requires one.
EU AI Act timeline (after the Omnibus VII agreement of 7 May 2026): Art. 5 prohibitions in force since 2 February 2025; GPAI obligations in force since 2 August 2025; Art. 50 transparency for synthetic content and the new NCII / synthetic-CSAM prohibition apply from 2 December 2026; Annex III high-risk obligations from 2 December 2027 (postponed from 2 Aug 2026); Annex I high-risk from 2 August 2028 (postponed from 2 Aug 2027). The full machine-readable timeline ships with Admina as
admina.domains.compliance.eu_ai_act.EU_AI_ACT_DEADLINES. SeeMODEL_CARD.mdfor the full scope, limitations, and known failure modes of every Admina component.
from admina import GovernedModel, GovernedData, GovernedAgent, ComplianceKit
from admina.plugins.builtin.adapters.ollama import OllamaAdapter
from admina.plugins.builtin.connectors.chromadb import ChromaDBConnector
# Every call is governed: PII redacted, injections blocked, audited
adapter = OllamaAdapter(host="http://localhost:11434")
model = GovernedModel(model_name="llama3.1:8b", adapter=adapter)
response = await model.ask("Summarize this document")
# Data governance: residency enforcement, PII classification
connector = ChromaDBConnector(host="localhost", port=8000)
data = GovernedData(connector=connector, residency_zone="eu")
await data.ingest(documents)
# Agent governance: validate every tool call before execution
async def my_upstream(method, params, **kw): ... # your MCP/HTTP client
agent = GovernedAgent(upstream=my_upstream)
result = await agent.call("tools/call", {"name": "read_file", "arguments": {}})
# Compliance: EU AI Act gap analysis and risk classification
kit = ComplianceKit()
report = kit.gap_analysis(risk_category="high", current_compliance={...})
Quick Start
Install from PyPI
# SDK only (lightweight, pure Python)
pip install admina-framework
# Proxy + infrastructure deps
pip install "admina-framework[proxy]"
# Everything (proxy + NLP + telemetry)
pip install "admina-framework[full]"
# After [nlp] / [full] install: download the spaCy NER model
python -m spacy download en_core_web_sm
# Optional: Rust-accelerated engine (auto-detected at runtime)
pip install admina-core
The PyPI distribution name is
admina-framework; the Python import name isadmina(e.g.from admina import GovernedModel). This is a normal Python pattern — same aspython-dateutil→import dateutil.
The Rust engine is an optional accelerator.
pip install admina-frameworkships only the pure-Python implementation; Admina auto-detects the Rust engine at runtime and falls back to the Python implementation if it's not installed.
Or install from source
git clone https://github.com/admina-org/admina.git
cd admina
# Option 1: SDK only (lightweight)
pip install -e .
python -c "from admina import GovernedModel; print('SDK ready')"
# Note: To use the OllamaAdapter, install Ollama (https://ollama.ai)
# and pull a model first: ollama pull llama3.1:8b
# Option 2: Proxy + infra deps
pip install -e ".[proxy]"
# Option 3: Everything (proxy + NLP + telemetry)
pip install -e ".[full]"
# Option 4: Full stack (proxy + dashboard + infra via Docker)
./scripts/bootstrap-secrets.sh # Auto-generate .env with random credentials
docker compose up --build # Credentials printed at bootstrap
# Option 5: CLI
pip install -e .
admina init my-project # Scaffold a governed AI project
cd my-project # admina dev runs from the project directory
admina dev # Start local dev stack
Dashboard: http://localhost:3000 | API docs: http://localhost:8080/docs
Architecture
Admina is organized into 4 governance domains:
| Domain | What it governs | Key features |
|---|---|---|
| Data Sovereignty | Where data lives and how it's protected | PII redaction (spaCy + regex), residency zones, data classification |
| AI Infrastructure | LLM and RAG stack | Ollama backend, ChromaDB vectors, Open WebUI, GPU auto-detect |
| Agent Security | What agents can do | Injection firewall (Rust), loop breaker, proxy governance |
| Compliance | Regulatory obligations | EU AI Act (Art. 6-15), forensic black box (SHA-256 chain), OTEL |
Every governance feature works in dual mode — both via SDK (in-process) and proxy (network):
SDK Mode: Proxy Mode:
your code AI Agent
| |
GovernedModel.ask() POST /mcp
| |
[governance pipeline] [governance pipeline]
| |
Ollama / OpenAI MCP Server / LLM
The 4 Governance Domains
| Domain | Capabilities | Engine |
|---|---|---|
| Agent Security | Anti-injection firewall (15 regex + heuristic scoring), loop breaker (TF-IDF cosine similarity) | Rust + Python |
| Data Sovereignty | PII redaction (email, SSN, credit cards, IBAN, phone, IP), residency enforcement, data classification | Rust + spaCy NER |
| Compliance | EU AI Act risk classification (Art. 6) and gap analysis (Art. 9-15), forensic black box (SHA-256 hash chain), OTEL native spans | Rust + Python |
| AI Infrastructure | LLM engine (Ollama, OpenAI), RAG pipeline (ChromaDB), Open WebUI | Python |
All governance domains operate bidirectionally — scanning both outbound requests and inbound responses.
SDK
Four governed primitives, each with async + sync interfaces:
from admina import GovernedModel, GovernedData, GovernedAgent, ComplianceKit
| Primitive | Purpose | Governance applied |
|---|---|---|
GovernedModel |
LLM calls (Ollama, OpenAI) | PII redaction on prompts and responses, event audit |
GovernedData |
Data ingestion and queries | PII classification, residency enforcement, access audit |
GovernedAgent |
MCP/A2A agent calls | Firewall, PII, loop breaker — full proxy pipeline in-process |
ComplianceKit |
Regulatory compliance | EU AI Act risk classification, gap analysis, report generation |
Plugin System
9 plugin interfaces, auto-discovered from plugins/builtin/ or installed via CLI:
| Interface | Builtin implementations |
|---|---|
| Model Adapter | Ollama, OpenAI |
| Data Connector | ChromaDB, Filesystem |
| Governance Domain | GuardrailsAI (toxic, jailbreak, bias, PII) |
| Compliance Template | EU AI Act |
| Transport Adapter | MCP, HTTP REST |
| Forensic Store | Filesystem, S3-compatible (boto3), MinIO (legacy) |
| Auth Provider | API Key |
| PII Engine | spaCy + Regex |
| Alert Channel | Log, Webhook |
admina plugin list # List registered plugins
admina plugin install ./my-plugin # Install a custom plugin
admina plugin create my-domain # Scaffold a new plugin
CLI
admina init my-project # Scaffold project with admina.yaml + docker-compose.yml
admina dev # Local mode: proxy + dashboard on :3000 (no Docker)
admina dev --stack # Docker stack: + redis + clickhouse + minio + grafana
admina dev --with-llm # --stack + ollama + chromadb + open-webui
admina plugin list # List all registered plugins
admina plugin install X # Install a plugin from path or registry
admina plugin create X # Scaffold a new plugin from template
admina dev defaults to a single-process local mode with zero Docker
dependency: one uvicorn serves the proxy API and the dashboard SPA on the
same port. Use --stack for the production-like Docker compose, or
--with-llm to also boot local LLM services.
Forensic backend — choose deliberately
The forensic blackbox (the SHA-256 hash chain that makes the audit trail tamper-evident) supports four backends. Read this before picking one for production.
| Backend | License | When to use | Caveats |
|---|---|---|---|
memory (default) |
n/a | Local development, tests, demos | Records are LOST on restart — no audit persistence. Loud warning at startup. |
filesystem |
n/a | Single-host on-prem, air-gapped, smaller deployments | Persistence depends on the host filesystem; not ideal for HA. Requires FORENSIC_BASE_DIR. |
s3 (boto3) |
Apache 2.0 (boto3) | Production / HA / multi-region | Works with any S3-compatible service — AWS S3, Cloudflare R2, Backblaze B2, SeaweedFS (Apache 2.0), Garage (AGPLv3), Ceph RGW (LGPLv2). Recommended new default. |
minio (legacy) |
see below ⚠️ | Backwards compatibility with existing MinIO clusters | Two distinct concerns; read the disclaimer. |
⚠️ MinIO disclaimer — what users of Admina need to know.
MinIO has two separate licensing/maintenance issues that can affect downstream users of Admina, even though Admina itself is Apache 2.0:
- MinIO Server is AGPLv3. If you deploy MinIO Server as part of a network-accessible service (e.g. a SaaS that exposes Admina's dashboard or API to the public Internet), AGPLv3's network clause can be read to require you to publish the source code of the combined application that interacts with MinIO over the network. The MinIO commercial license removes this obligation, but is paid. This is not an Admina obligation — Apache 2.0 is permissive — but it is an obligation MinIO Server itself imposes on whoever runs it.
- The MinIO Python SDK has been archived. No more security patches, no support for new Python releases. Continuing to depend on it is a supply-chain risk.
Recommendation: for new deployments, use
FORENSIC_BACKEND=s3. Theboto3client is Apache 2.0 and works against any S3-compatible service. Two open-source FOSS-friendly options that don't trigger the AGPL network clause for typical Admina deployments:
- SeaweedFS (Apache 2.0, S3 gateway, lightweight, single binary)
- Garage (AGPLv3, but as a backend — Garage's AGPL applies to Garage itself, not to applications that connect to it via S3 API)
Existing MinIO deployments keep working through
FORENSIC_BACKEND=minio, but plan a migration. Theminiobackend will be removed in a future release.
Dashboard
Real-time governance dashboard on port 3000:
- Governance Score — 0-100 composite metric (data residency, audit coverage, attack rate, forensic integrity, EU AI Act compliance)
- Live Feed — streaming governance events via WebSocket
- Compliance Gaps — EU AI Act gap analysis with article-level detail
- Infrastructure Health — proxy, Redis, MinIO, ClickHouse, OTEL status
API backend: GET /api/dashboard/score, /feed, /compliance, /sovereignty, /infra, /models
Configuration
Admina uses admina.yaml as the primary config file (with .env fallback for backward compatibility):
cp admina.yaml.example admina.yaml # Copy and customize
See admina.yaml.example for all options including domains, AI infra, plugins, dashboard, forensic storage, alert channels, and integrations.
Environment variables (Docker / .env)
| Variable | Default | Description |
|---|---|---|
ADMINA_API_KEY |
(empty) | API key for all endpoints |
UPSTREAM_MCP_URL |
http://localhost:9000 |
Default upstream MCP server |
REDIS_URL |
redis://localhost:6379/0 |
Session state + rate limiting |
MINIO_SECRET_KEY |
(required) | MinIO secret key for forensic storage |
LOG_LEVEL |
INFO |
Logging verbosity |
Integrations
GuardrailsAI
ML-based content validation (toxic language, jailbreak, bias, PII via Presidio) as a governance domain plugin:
# Upstream guardrails-ai is currently in PyPI quarantine. Install it
# manually from your local mirror or wheel cache; once available, the
# plugin in admina/plugins/builtin/guards/guardrailsai_guard.py will
# detect it automatically.
pip install <your-guardrails-ai-wheel>
Enable in admina.yaml under agent_security.domains.guardrailsai. All inference runs locally by default — no data leaves the deployment perimeter.
OpenClaw
Govern OpenClaw agent actions through the Admina proxy. Every tool call, shell command, and API request is validated before execution:
cd integrations/openclaw/admina-governance
chmod +x setup.sh && ./setup.sh
The skill uses POST /api/v1/validate (pre-action) and POST /api/v1/audit (post-action) endpoints.
n8n
Community nodes for n8n workflow automation:
| Node | Purpose |
|---|---|
| Admina Govern | Inline governance check — validates workflow data, blocks injections, redacts PII |
| Admina Audit | Logs workflow events to forensic black box with EU AI Act risk classification |
| Admina Dashboard | Trigger node — fires on governance events via WebSocket |
Install: npm install n8n-nodes-admina in your n8n instance.
Cheshire Cat AI
Govern all Cheshire Cat interactions via three Python hooks (agent_fast_reply, before_cat_sends_message, before_cat_recalls_memories):
cd integrations/cheshirecat/admina-plugin
./setup.sh # Start Admina sidecar
# Copy plugin into Cheshire Cat plugins/ directory
LangChain
Drop-in callback handler — governs every LLM call and tool invocation in-process:
from admina.integrations.langchain.callbacks import AdminaCallbackHandler
handler = AdminaCallbackHandler()
llm = ChatOpenAI(callbacks=[handler])
CrewAI
Step and task callbacks for multi-agent governance:
from admina.integrations.crewai.callbacks import admina_step_callback, admina_task_callback
agent = Agent(role="Researcher", step_callback=admina_step_callback)
crew = Crew(agents=[agent], tasks=[task], task_callback=admina_task_callback)
See full integration docs for details.
Hybrid Python + Rust Engine
The Rust core engine is an optional accelerator. pip install admina-framework
ships only the pure-Python implementation; to enable the Rust engine
build admina_core separately (maturin develop --release --manifest-path core-rust/Cargo.toml, see CONTRIBUTING.md).
At runtime Admina auto-detects whichever is available and falls back
transparently to Python if the Rust extension is not installed.
Measured numbers below assume the Rust engine is loaded:
Component Rust (median) P95 P99
----------------- ------------- --------- ---------
Firewall (regex) 2.08us 2.33us 2.50us
PII Scanner 0.62us 0.67us 0.71us
Loop Breaker 2.38us 2.67us 2.75us
Hash Chain 1.00us 1.12us 1.25us
----------------- ------------- --------- ---------
4-Domain pipeline 6.25us 7.04us 7.29us
Rust vs Python comparison (click to expand)
Component Python (median) Rust (median) Speedup
----------------- --------------- ------------- --------
Firewall 7.79us 2.08us 3.7x
PII (regex-only) 8.21us 0.62us 13.2x
PII (with spaCy) 1 992us 0.62us 3 213x
Loop (sklearn) 505us 2.38us 212x
----------------- --------------- ------------- --------
Full pipeline 2 261us 5.21us 434x
Traffic Simulator
Generate realistic governance traffic to test and demo the platform:
# Start the proxy
docker compose up -d
# Default: 60s at 2 req/s
python scripts/simulate.py
# Intense: 5 minutes at 10 req/s
python scripts/simulate.py --duration 300 --rate 10
Generates a weighted mix of: clean MCP requests, injection attempts, PII content, loop triggers, REST validate/audit calls, EU AI Act classifications, and dashboard reads. Colored terminal output with per-event action and summary counters.
Project Structure
admina/
+-- admina/ SDK package (GovernedModel, GovernedData, GovernedAgent, ComplianceKit)
| +-- plugins/ Plugin base classes + registry
+-- domains/ 4 governance domains
| +-- data_sovereignty/ PII, residency, classification
| +-- ai_infra/ LLM engine, RAG pipeline, Web UI
| +-- agent_security/ Firewall, loop breaker, proxy
| +-- compliance/ EU AI Act, forensic, OTEL
+-- plugins/builtin/ Reference plugin implementations
| +-- adapters/ Ollama, OpenAI
| +-- connectors/ ChromaDB, Filesystem
| +-- domains/ GuardrailsAI
| +-- compliance/ EU AI Act template
| +-- transports/ MCP, HTTP REST
| +-- forensic/ MinIO, Filesystem
| +-- auth/ API Key
| +-- pii/ spaCy + Regex
| +-- alerts/ Log, Webhook
+-- proxy/ FastAPI proxy + Rust engine bridge
| +-- api/ Dashboard + integration REST endpoints
+-- cli/ CLI commands (init, dev, plugin)
+-- core/ Config, types, event bus
+-- core-rust/ Rust governance engines (PyO3)
+-- dashboard/ Real-time governance web UI
+-- integrations/
| +-- openclaw/ OpenClaw governance skill
| +-- n8n/ n8n community nodes
+-- tests/ 800+ tests (pytest)
+-- docker-compose.yml Full stack deployment (9 containers)
API
# Health check (always public)
curl http://localhost:8080/health
# Governance stats
curl http://localhost:8080/api/stats -H "X-API-Key: $ADMINA_API_KEY"
# Proxy an MCP call (all governance domains applied)
curl -X POST http://localhost:8080/mcp \
-H "Content-Type: application/json" \
-d '{"jsonrpc":"2.0","id":1,"method":"tools/call","params":{...}}'
# Validate content (REST API for integrations)
curl -X POST http://localhost:8080/api/v1/validate \
-H "Content-Type: application/json" \
-d '{"content": "Check this text for governance issues"}'
# Audit an action (forensic logging)
curl -X POST http://localhost:8080/api/v1/audit \
-H "Content-Type: application/json" \
-d '{"event": {"action": "llm_call", "status": "success"}}'
# EU AI Act risk classification
curl -X POST http://localhost:8080/api/compliance/classify \
-H "Content-Type: application/json" \
-d '{"description":"AI credit scoring","use_case":"lending","data_types":["financial"]}'
# Dashboard governance score
curl http://localhost:8080/api/dashboard/score
Infrastructure & Services
The full stack (docker compose up) runs 9 containers:
| Port | Service | Description |
|---|---|---|
8080 |
Proxy | MCP proxy + REST API + OpenAPI docs |
3000 |
Dashboard | Real-time governance web UI |
3001 |
Grafana | Metrics dashboards |
9090 |
MinIO Console | Forensic storage browser |
4317 |
OTEL Collector | OTLP gRPC ingestion |
ClickHouse and Redis are internal only (not exposed to host).
Project documents
- CONTRIBUTING.md — development setup, testing, and pull request workflow
- MODEL_CARD.md — transparency artifact for every Admina governance component (intended use, scope, limitations, known failure modes), aligned with EU AI Act Art. 13 and NIST AI RMF
- ROADMAP.md — planned milestones from 0.9.x to 1.0 and beyond
- CHANGELOG.md — release notes
- SECURITY.md — coordinated disclosure policy
- CODE_OF_CONDUCT.md — Contributor Covenant 2.1
Admina is Apache 2.0. Contributions are welcome.
License
Copyright © 2025–2026 Stefano Noferi & Admina contributors
Licensed under the Apache License, Version 2.0. See LICENSE for the full text.
Heimdall — the Governance Owl
admina.org · Created by Stefano Noferi · Pisa, Italy
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file admina_framework-0.9.1.tar.gz.
File metadata
- Download URL: admina_framework-0.9.1.tar.gz
- Upload date:
- Size: 652.4 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.13
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
ebc237e4feaa12033203018667b77eb5e28d4451199be0bb687d024d48828dd2
|
|
| MD5 |
23b8933314b0bd12a4ac346a2ad7cc9c
|
|
| BLAKE2b-256 |
4a88b0482fdde4dde92d7287c37d1d255a620e14425a8648749c30c1f6303bfc
|
Provenance
The following attestation bundles were made for admina_framework-0.9.1.tar.gz:
Publisher:
release.yml on admina-org/admina
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
admina_framework-0.9.1.tar.gz -
Subject digest:
ebc237e4feaa12033203018667b77eb5e28d4451199be0bb687d024d48828dd2 - Sigstore transparency entry: 1588585029
- Sigstore integration time:
-
Permalink:
admina-org/admina@7926fadfcf6a59f5b7992100cc3fc3a87ff8bef1 -
Branch / Tag:
refs/tags/v0.9.1 - Owner: https://github.com/admina-org
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@7926fadfcf6a59f5b7992100cc3fc3a87ff8bef1 -
Trigger Event:
push
-
Statement type:
File details
Details for the file admina_framework-0.9.1-py3-none-any.whl.
File metadata
- Download URL: admina_framework-0.9.1-py3-none-any.whl
- Upload date:
- Size: 681.7 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.13
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
1e30052972b33158c308e62899d6ebff56cea9bf18498535b6495c9a5fdde7b1
|
|
| MD5 |
a5d7fb1c87ab7cfa3b297503a1419f17
|
|
| BLAKE2b-256 |
708f0a5509d875bff7af005326b7bc7a7fe7450d8a39197cf3415e6cffb82223
|
Provenance
The following attestation bundles were made for admina_framework-0.9.1-py3-none-any.whl:
Publisher:
release.yml on admina-org/admina
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
admina_framework-0.9.1-py3-none-any.whl -
Subject digest:
1e30052972b33158c308e62899d6ebff56cea9bf18498535b6495c9a5fdde7b1 - Sigstore transparency entry: 1588585092
- Sigstore integration time:
-
Permalink:
admina-org/admina@7926fadfcf6a59f5b7992100cc3fc3a87ff8bef1 -
Branch / Tag:
refs/tags/v0.9.1 - Owner: https://github.com/admina-org
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@7926fadfcf6a59f5b7992100cc3fc3a87ff8bef1 -
Trigger Event:
push
-
Statement type: