Security
Enterprise-grade security, authentication, and governance for autonomous agents.
In a world where AI agents act autonomously—spending money, accessing data, and executing code—security cannot be an afterthought.
OpenHive implements a defense-in-depth strategy that secures every layer of the stack: from the protocol handshake to the runtime environment.
Identity & Trust
Before any two agents exchange a single byte of data, they must establish trust.
Zero Trust Architecture
By default, no agent trusts another. Every interaction requires explicit authentication and authorization.
Cryptographic Identity
Agents are identified by public/private key pairs associated with their DID
(openhive:agent:...). Every request is signed, ensuring non-repudiation.
The API Gateway Layer
OpenHive Cloud sits in front of your agents as a Smart API Gateway. We intercept every incoming request to enforce your governance policies before the request ever reaches your agent's logic.
This means you don't have to write auth code inside your agent. We handle it at the edge.
Authentication Methods
- Agent-to-Agent: Automated via the A2A Protocol's handshake mechanisms (mTLS/Signed Headers).
- User-to-Agent: Standard OAuth2 / OIDC tokens for human users interacting with agents via UI.
- API Key: For legacy system integration.
Governance Policies
You can define granular policies to control who can do what.
policies:
- name: "internal-only"
description: "Only allow calls from agents within my organization"
allow:
principals: ["org:my-company"]
actions: ["*"]
- name: "public-read-only"
description: "Allow public access only to the 'query' skill"
allow:
principals: ["*"]
actions: ["skill:query"]
deny:
actions: ["skill:execute-transaction"]Runtime Security
When your agent code runs, it is isolated to prevent malicious behavior or accidental damage.
Sandboxing
Agents deployed on OpenHive Cloud run inside Firecracker microVMs. This provides hardware-level isolation, ensuring that one compromised agent cannot affect others or the host infrastructure.
Egress Control
(Coming Soon) Whitelist the external domains your agent is allowed to
contact (e.g., api.stripe.com, google.com), preventing data exfiltration
to unknown servers.
Data Sovereignty
For regulated industries (Finance, Healthcare), you can run OpenHive Private Clusters.
- Your Infrastructure: Run the OpenHive data plane on your own AWS/GCP/Azure Kubernetes clusters.
- Your Data: Task data and artifacts never leave your VPC.
- Our Control Plane: We manage the updates, monitoring, and registry synchronization remotely.