Skip to content

Commit b123f6a

Browse files
fix: reframe README disclaimer and close ASI-10 stale note (#240)
- Reframe architecture disclaimer: lead with enforcement strengths (deterministic sub-ms interception) instead of warning about limitations - Update Architecture Notes section: capability-first framing with defense-in-depth composition table replacing negative what-it-doesnt-do - Close stale ASI-10 Known Limitations entry: behavioral anomaly detection (tool-call frequency, action entropy, capability violations) is fully shipped in agent-sre with 72 passing tests - Update ASI-10 OWASP row to reference agent-sre anomaly module - Fix agent-mesh test_anomaly.py skip reason: point to agent-sre canonical tests instead of misleading 'anomaly.py not included' Closes #228 Closes #233 Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
1 parent c2d90fc commit b123f6a

File tree

2 files changed

+26
-20
lines changed

2 files changed

+26
-20
lines changed

README.md

Lines changed: 15 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -19,10 +19,10 @@
1919

2020
---
2121

22-
> **⚠️ Architecture Note:** This toolkit provides **application-level policy enforcement** (Python middleware).
23-
> It does not provide OS kernel-level isolation — agents share the host process by default.
24-
> For high-security environments, combine with infrastructure isolation (containers, VMs, separate processes).
25-
> See [Architecture Notes](#architecture-notes) for details on the security model and its boundaries.
22+
> **🔒 Enforcement Model:** Deterministic application-layer interception — every agent action is evaluated
23+
> against policy **before execution**, at sub-millisecond latency. For high-security environments,
24+
> composes with container/VM isolation for defense-in-depth.
25+
> See [Architecture Notes](#architecture-notes) for details.
2626
2727
## Why Agent Governance?
2828

@@ -150,7 +150,7 @@ Works with **12+ agent frameworks** including:
150150
| Unsafe Inter-Agent Communication | ASI-07 | ✅ AgentMesh encrypted channels + trust gates |
151151
| Cascading Failures | ASI-08 | ✅ Circuit breakers + SLO enforcement |
152152
| Human-Agent Trust Deficit | ASI-09 | ✅ Full audit trails + flight recorder |
153-
| Rogue Agents | ASI-10 | ✅ Kill switch + ring isolation + quarantine |
153+
| Rogue Agents | ASI-10 | ✅ Kill switch + ring isolation + behavioral anomaly detection ([Agent SRE](packages/agent-sre/src/agent_sre/anomaly/)) |
154154

155155
## Documentation
156156

@@ -166,22 +166,19 @@ Works with **12+ agent frameworks** including:
166166

167167
### Security Model & Boundaries
168168

169-
This toolkit operates as **Python middleware**it intercepts agent actions at the application level, not at the OS or hardware level. Understanding this boundary is critical:
169+
This toolkit provides **deterministic application-layer interception**a deliberate architectural choice that enables sub-millisecond policy enforcement without the overhead of IPC or container orchestration. Every agent action passes through the governance pipeline before execution.
170170

171-
| What it does | What it does NOT do |
171+
| Enforcement Capability | Defense-in-Depth Composition |
172172
|---|---|
173-
| Intercepts and evaluates every agent action before execution | Provide OS kernel-level process isolation |
174-
| Enforces capability-based least-privilege policies | Prevent a compromised Python process from bypassing policies |
175-
| Provides cryptographic agent identity (Ed25519) | Run agents in separate address spaces (by default) |
176-
| Maintains append-only audit logs with hash chains | Guarantee tamper-evidence against in-process adversaries |
177-
| Terminates non-compliant agents via signal system | Prevent a `try/except BaseException` from catching termination |
173+
| Intercepts and evaluates every agent action before execution | Add container isolation (Docker, gVisor, Kata) for OS-level separation |
174+
| Enforces capability-based least-privilege policies | Add network policies for cross-agent communication control |
175+
| Provides cryptographic agent identity (Ed25519) | Add external PKI for certificate lifecycle management |
176+
| Maintains append-only audit logs with hash chains | Add external append-only sink (Azure Monitor, write-once storage) for tamper-evidence |
177+
| Terminates non-compliant agents via signal system | Add OS-level `process.kill()` for isolated agent processes |
178178

179-
**For production deployments requiring strong isolation**, we recommend:
180-
- Running each agent in a **separate process or container**
181-
- Writing audit logs to an **external append-only sink** (Azure Monitor, write-once storage)
182-
- Using OS-level `process.kill()` for termination of isolated agent processes
179+
The POSIX metaphor (kernel, signals, syscalls) is an architectural pattern — it provides a familiar, well-understood mental model for agent governance. The enforcement boundary is the Python interpreter, which is the same trust boundary used by every Python-based agent framework (LangChain, AutoGen, CrewAI, OpenAI Agents SDK).
183180

184-
The POSIX metaphor (kernel, signals, syscalls) is an architectural pattern — it provides a familiar, well-understood mental model for agent governance, but the enforcement boundary is the Python interpreter, not the OS scheduler.
181+
> **Production recommendation:** For high-security deployments, run each agent in a separate container with the governance middleware inside. This gives you both application-level policy enforcement *and* OS-level isolation.
185182
186183
### Trust Score Algorithm
187184

@@ -203,7 +200,7 @@ Policy enforcement benchmarks are measured on a **30-scenario test suite** cover
203200

204201
### Known Limitations & Roadmap
205202

206-
- **ASI-10 Behavioral Detection**: Termination and quarantine are implemented; anomaly detection (tool-call frequency analysis, action entropy scoring) is in active development
203+
- **ASI-10 Behavioral Detection**: Fully implemented in Agent SRE — tool-call frequency analysis (z-score spike detection), action entropy scoring, and capability profile violation detection. See [`packages/agent-sre/src/agent_sre/anomaly/`](packages/agent-sre/src/agent_sre/anomaly/) (72 tests passing)
207204
- **Audit Trail Integrity**: Current hash-chain is in-process; external append-only log integration is planned
208205
- **Framework Integration Depth**: Current adapters wrap agent execution at the function level; deeper hooks into framework-native tool dispatch and sub-agent spawning are planned
209206
- **Observability**: OpenTelemetry integration for policy decision tracing is planned

packages/agent-mesh/tests/test_anomaly.py

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,20 @@
11
# Copyright (c) Microsoft Corporation.
22
# Licensed under the MIT License.
3-
"""Tests for behavioral anomaly detection."""
3+
"""Tests for behavioral anomaly detection.
4+
5+
NOTE: Behavioral anomaly detection is implemented in the Agent SRE package
6+
(agent_sre.anomaly.rogue_detector), not in Agent Mesh. The Agent SRE module
7+
provides tool-call frequency analysis, action entropy scoring, and capability
8+
profile violation detection. See packages/agent-sre/tests/unit/test_rogue_detector.py
9+
and packages/agent-sre/tests/unit/test_anomaly_detection.py for the canonical tests
10+
(72 tests covering all ASI-10 behavioral detection scenarios).
11+
"""
412

513
import pytest
614

715
pytestmark = pytest.mark.skip(
8-
reason="anomaly.py not included"
16+
reason="Behavioral anomaly detection moved to agent-sre package; "
17+
"see packages/agent-sre/tests/unit/test_rogue_detector.py"
918
)
1019

1120

0 commit comments

Comments
 (0)