📁 Restricts filesystem access to /sandbox and /tmp only — locked at sandbox creation, cannot be changed at runtime
🌐 Blocks all outbound network connections by default — you whitelist specific hosts in YAML policy files that can be hot-reloaded without restarting the agent
🔒 Prevents privilege escalation and dangerous syscalls at the kernel level — cannot be overridden by the agent
📡 Intercepts every inference request the agent makes — routes it through the Privacy Router rather than letting the agent call APIs directly
📋 Logs every agent action with a full audit trail — file reads, network calls, tool invocations, inference requests — all timestamped and attributable