Skip to content
#

capability-based-security

Here are 25 public repositories matching this topic...

A data-driven, cryptographically signed, registry-backed AI operating system, with capability-scoped execution and graph-executable workflows — living inside your projects, running through a recursive MCP that goes as deep as you dare.

  • Updated Apr 10, 2026
  • Python

InferNode is a security-focused 64-bit Inferno® OS (ARM64/AMD64) for embedded systems, servers, and AI agents. GPL-free, headless-capable, with 280+ utilities and 9P filesystem protocol. Providing a namespace-based alternative to MCP servers. Namespace-bounded security has been formally verified.

  • Updated Apr 9, 2026
  • Limbo

Secure-execution domain repository providing modular runtime-security components for sandboxing, capability enforcement, cryptographic isolation, audit logging, and policy-driven execution control — designed for building hardened application and infrastructure runtimes.

  • Updated Feb 12, 2026
  • Rust

Edge computing demo with Rust + WASM. Features URL shortener, rate limiter, and capability-based security—all running on Cloudflare Workers. Interactive Leptos dashboard with live stats. Demonstrates Workers KV, edge-based rate limiting, and WASI security patterns.

  • Updated Jan 17, 2026
  • Rust
kingpin_demo

Toy governance CLI demo: deny-by-default “danger actions” gated by signed, expiring capability leases (global revoke-all + nonce revoke) plus guarded memory quarantine. Simulation-only: no real network/shell/files. Includes tripwire + tests to prevent misuse.

  • Updated Feb 17, 2026
  • Python

Improve this page

Add a description, image, and links to the capability-based-security topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the capability-based-security topic, visit your repo's landing page and select "manage topics."

Learn more