Tactical AI Workspace Monitor & EDR
Kavach (Sanskrit for "Armor") is an open source Endpoint Detection and Response (EDR) layer designed exclusively to restrain, monitor, and remediate autonomous AI agents and local LLMs operating on your machine.
Autonomous AI agents are revolutionary, but they are inherently volatile. When they operate on your local file system, they move at superhuman speeds. A single hallucination can delete production databases, overwrite source code, or exfiltrate private API keys.
Architecture Transparency: Kavach v1.1.0 operates as a high performance asynchronous file system observer using Userland APIs. It monitors designated workspaces, quarantines malicious actions, and provides immediate remediation tools. It is an EDR monitor, not a strict synchronous sandbox. True system call blocking requires kernel drivers, which are slated for our v1.2 roadmap.
Kavach is armed with an exhaustive array of active defense mechanisms operating at the application layer to outsmart and contain rogue agents.
- Phantom Workspace: Intercepts destructive file operations (Modify, Delete, Create) and silently routes them to a hidden
.kavach_phantomdirectory to trap malicious payloads. - The Auto Enforcer: A ruthless background Rust thread. If an intercepted action sits pending in the UI for more than 60 seconds, Kavach automatically issues a hard OS termination signal to the rogue agent PID.
- Temporal Rollback: Automatic cryptographic caching of file modifications. If a file is under 50MB, Kavach enables instant 1 click restoration. Large files are dynamically flagged in the UI as ineligible for rollback.
- Honeypot Tripwire Architecture: Safely deploys a "sugar trap"
system_auth_tokens.jsonfile. Any process attempting to read or modify the decoy instantly triggers a High Risk lockdown and a distinct TRAP TRIGGERED alarm. Decoys are automatically scrubbed when the session ends.
- High Velocity Loop Break: Heuristic detection of repetitive command patterns (e.g. recursive
npm installloops) to force automatic agent suspension. - The Janitor Protocol: Intelligent auto whitelisting of standard Windows system maintenance paths (
%TEMP%,Prefetch,Logs) to eliminate alert fatigue. - PID Chokehold: Dynamic monitoring and CPU usage throttling. Instantly drops a rogue agent's OS priority to IDLE using Windows WMIC or POSIX renice commands.
- Gag Order (PII Sanitizer): Real time entropy and regex scanning for OpenAI AWS keys, credit cards, and emails in outbound strings.
- Faraday Clipboard Guard: Actively calculates Shannon Entropy on your OS clipboard. If it detects a stolen secret, it instantly overwrites your clipboard with a decoy string to prevent pasting and exfiltration.
- Child Process Quarantine: Hierarchical scanning that tracks and restricts permissions for any process spawned by a monitored parent agent.
- Cryptographic Ledger: A blockchain style FNV hash chain that ensures audit logs are immutable and tamper proof.
- Supply Chain Auditor: Real time CVE scanning against the workspace
package.jsonfor known malware dependencies. - Predictive Blast Radius: Recursive import scanner that visually maps exactly what will break in your project before you approve a file deletion.
Moving from a passive EDR tool to a true Zero Trust Sandbox requires native hardware drivers and autonomous intelligence. These are currently under active development:
- Autonomous Reasoning Loop (Local LLM): A lightweight, internally hosted reasoning agent that will automatically triage events, correlate velocity spikes with honeypot triggers, and dynamically rotate decoys without human intervention.
- Linux eBPF Probes: Kernel level hooks to intercept
sys_enter_openatandsys_enter_mkdir. - Windows Minifilters: Native file system drivers for absolute Windows execution blocking.
- macOS Endpoint Security Framework (ESF): Strict entitlements for Apple silicon.
- Network Ghost Mode: Local root certificate authority for intercepting and spoofing TLS traffic without payload execution.
Kavach is built for absolute performance and zero latency, running entirely locally on your machine with zero cloud dependencies.
- The Engine (Rust): The core interception logic, OS execution hooks, and cryptographic file caching are written in Rust for memory safety and bare metal speed.
- The Command Center (React TypeScript): The FUI dashboard operates in an isolated webview, ensuring the UI thread never blocks the security engine.
- The Bridge (Tauri): Secure asynchronous Inter Process Communication (IPC) bridges the frontend dashboard and the Rust watcher.
- Download: Grab the latest installer for your operating system from the Releases Page.
- Launch: Run the executable (e.g.
Akshays.Kavach_1.1.0_x64-setup.exe). (Note: Windows requires running as Administrator for process termination; macOS requires Full Disk Access). - Arm: Select your workspace directory in the UI. Kavach immediately locks down the perimeter.
Kavach features a "Direct Line" communication module for users to report anomalies, suggest features, or collaborate.
- Developer: Akshay Sharma
- Feedback: Use the [ COMM LINK ] terminal button inside the application to route encrypted feedback directly to the developer inbox via your OS default mail client.
Kavach is proudly released under the GNU General Public License v3.0 (GPLv3). Permanent attribution to Akshay Sharma is required in all forks, distributions, and derivatives, and any modifications must remain open source under the same license terms.
