Deploy safe, autonomous AI agents in one command.
Enterprise AI Agent Runtime built on kernel-level isolation — Landlock LSM, seccomp BPF, and network namespaces. Multi-provider inference routing with YAML policy control. Infrastructure that cannot be breached.
Built for zero-trust
autonomy.
Six pillars that turn unpredictable agents into auditable infrastructure.
Kernel-Level Isolation
Deny-by-default network egress, API key isolation, L7 TLS MITM inspection, and full privilege separation enforced at the syscall boundary.
Multi-Provider Routing
Hot-swap between Claude, GPT, Llama, Nemotron and more at runtime — no restarts, no downtime, no leaked credentials.
YAML Policy Control
Declarative host, port and method restrictions with shipping presets. Audit-friendly, version-controlled, GitOps-ready.
20+ Messaging Channels
Native bridges to Telegram, Discord, Slack, WhatsApp and beyond. Deploy a new surface in a single command.
Production Operations
Watchdog supervision, fork-bomb prevention, integrity diagnostics, and automatic recovery — battle-tested for 24/7 uptime.
Skills Marketplace
Install vetted agent capabilities from the hub. SHA256-verified, sandboxed by default, removable in one command.
Six layers,
zero trust.
Every request crosses a defined boundary. Every boundary enforces policy. Every policy is auditable from CLI to kernel.
Infrastructure that
cannot be breached.
Six guarantees baked into the runtime. Not bolted on — enforced at the kernel.
Deny-by-Default Networking
No egress unless declared in policy. Every connection inspected, logged, and rate-limited at the gateway.
L7 TLS Inspection
Caddy terminates and re-encrypts agent traffic, exposing payloads to policy filters before forwarding.
API Key Injection
Credentials never enter the agent process. Injected at the proxy layer, scrubbed from every log.
Operator Approval
Sensitive actions pause for human confirmation via signed channel. Approvals are cryptographically logged.
Fork-Bomb Prevention
Cgroup limits cap process count, memory, and CPU. Runaway agents are killed before they affect the host.
SHA256 Integrity
Every binary, skill, and policy is hash-verified at load time. Tampered artifacts refuse to run.
Eleven models,
one router.
Switch providers in real time. No SDK reshuffling, no environment swaps, no leaked tokens.
Three steps to
production.
From zero to a sandboxed, multi-provider agent in under five minutes.
Install
Single binary. No daemons, no system services, no hidden state.
$ npm i -g diffractOnboard
Provision the kernel sandbox, register your providers, and spin up the proxy.
$ diffract onboardDeploy
Hand the runtime a YAML manifest. The runtime handles the rest — securely.
$ diffract deploy agent.yamlReady to deploy your
first agent?
Open source. Self-hosted. Audit-ready. Built for teams who refuse to trade safety for speed.