You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
arXiv:2603.12621 — AEGIS: No Tool Call Left Unchecked — A Pre-Execution Firewall and Audit Layer for AI Agents
Key Finding
Framework-agnostic 3-stage tool call intercept: (1) argument extraction, (2) risk scan, (3) policy validation. Produces an Ed25519+SHA-256 chained audit trail. Blocked 48/48 attack scenarios at 1.2% false positive rate and 8.3ms median overhead across 14 agent frameworks.
Applicability to Zeph
zeph-tools: Zeph's ToolExecutor trait runs tools after the LLM returns a tool_use block. AEGIS-style pre-execution intercept fits naturally here — validate tool arguments against a policy before executing.
Risk scan stage: Complements the existing ExfiltrationGuard and sandbox checks. The 3-stage pipeline (extract → scan → validate) is more structured than current ad-hoc checks in legacy.rs / native.rs.
Implementation sketch: Add PreExecutionFirewall trait to zeph-tools. Default impl passes through; security impl runs the 3 stages. Wire into CompositeExecutor.execute() before dispatching to the concrete executor.
1.2% FPR at 8.3ms: Well within acceptable bounds for interactive agent use.
Paper
arXiv:2603.12621 — AEGIS: No Tool Call Left Unchecked — A Pre-Execution Firewall and Audit Layer for AI Agents
Key Finding
Framework-agnostic 3-stage tool call intercept: (1) argument extraction, (2) risk scan, (3) policy validation. Produces an Ed25519+SHA-256 chained audit trail. Blocked 48/48 attack scenarios at 1.2% false positive rate and 8.3ms median overhead across 14 agent frameworks.
Applicability to Zeph
ToolExecutortrait runs tools after the LLM returns atool_useblock. AEGIS-style pre-execution intercept fits naturally here — validate tool arguments against a policy before executing.ClaimSourceandAuditEntry. AEGIS's chained Ed25519 audit would extend this: eachAuditEntrycould sign over the previous hash, making the audit log tamper-evident.ExfiltrationGuardand sandbox checks. The 3-stage pipeline (extract → scan → validate) is more structured than current ad-hoc checks inlegacy.rs/native.rs.PreExecutionFirewalltrait tozeph-tools. Default impl passes through; security impl runs the 3 stages. Wire intoCompositeExecutor.execute()before dispatching to the concrete executor.