Skip to content

[Feature]: OS-Level Enforcement in AI Agent Governance #1793

@rastogivaibhav

Description

@rastogivaibhav

Package

agent-os-kernel

Problem Statement

Modern AI agents are rapidly evolving from passive assistants into autonomous systems capable of executing workflows, invoking tools, accessing APIs, modifying infrastructure, interacting with enterprise data, and orchestrating cross-system operations.

Current governance frameworks, including application-layer agent governance toolkits, primarily operate within the same trust boundary as the agent runtime itself. While these frameworks provide valuable policy orchestration, telemetry, and middleware controls, they remain fundamentally dependent on the integrity of the userspace process executing the agent.

This creates a structural security gap.

Core Problem

Application-layer governance can be bypassed when:

  • The agent runtime is compromised through prompt injection
  • A malicious or compromised plugin executes unauthorized operations
  • A process hijack occurs within the same userspace boundary
  • Middleware hooks are disabled or circumvented
  • Network egress occurs outside the monitored execution path
  • Local execution environments bypass framework-native interception

As AI agents become increasingly autonomous and capable of interacting with sensitive systems, enterprises require a non-bypassable enforcement layer capable of operating independently from the agent runtime itself.

Today, there is no standardized OS-level enforcement model integrated into mainstream AI governance stacks.

Why This Matters

Enterprise AI governance currently lacks:

  • Kernel-level policy enforcement
  • Non-bypassable execution controls
  • OS-native network interception for AI agents
  • Tamper-resistant runtime enforcement
  • Independent trust boundaries outside userspace
  • Cryptographically verifiable forensic execution trails

This creates operational and compliance risks for enterprises deploying autonomous AI systems into production environments.

Proposed Solution

Proposed Direction

Introduce support for OS-level governance enforcement as a complementary enforcement layer alongside Microsoft Agent Governance Toolkit (AGT).

The proposed model would enable:

  • Policy enforcement below the application trust boundary
  • Runtime interception of outbound actions before execution
  • Independent enforcement even if the agent process is compromised
  • Fail-closed enforcement behavior
  • Cryptographically verifiable audit chains
  • Defense-in-depth between middleware governance and operating system controls

Potential integration points may include:

  • Windows Filtering Platform (WFP)
  • Event Tracing for Windows (ETW)
  • eBPF-based enforcement for Linux environments
  • Kernel telemetry hooks
  • External policy decision points (OPA/Rego)
  • Enterprise SIEM and compliance systems

Strategic Value

This capability would help establish:

  • A trusted runtime model for autonomous AI systems
  • Stronger enterprise adoption confidence
  • Improved compliance alignment (EU AI Act, NIST AI RMF, ISO 42001)
  • Reduced risk of agentic abuse and unauthorized execution
  • Defense-in-depth architecture for production AI systems

Desired Outcome

A future AI governance architecture where:

  • Application-layer governance provides orchestration and developer ergonomics
  • OS-level enforcement provides non-bypassable runtime guarantees
  • Enterprises can securely deploy autonomous AI agents into production environments with verifiable enforcement and forensic traceability

In this model, governance moves from being advisory middleware to enforceable runtime security infrastructure.

Alternatives Considered

No response

Priority

None

Contribution

  • I would be willing to submit a PR for this feature

Metadata

Metadata

Labels

enhancementNew feature or requesttriageNeeds triage

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions