Security by Isolation

Tamer.ai is built on a "Local-First" philosophy. We believe that control over your AI agents should never come at the cost of exposing your intellectual property or sensitive credentials.

1. Air-Gapped Secrets

Your API keys (Anthropic, OpenAI, Google) never leave your machine. Tamer wraps your agent locally, meaning the agent communicates directly with the LLM providers from your terminal. The Tamer server only sees redacted metadata and the PTY stream.

2. Zero-Trust Orchestration

When using our Multi-Agent Pipeline, Tamer acts as a secure air-lock. If you have Claude coding and Gemini testing, they operate in separate isolated workers. The Master Agent synchronizes them without sharing unredacted memory between models.

3. Path Protection & Sandboxing

Tamer implements granular file-system rules. You can define "No-Go" zones (like .ssh/ or .env) that agents are physically blocked from reading or modifying, regardless of their own internal logic.

4. End-to-End Control

Every dangerous action (bash command, file deletion) requires a Human-In-The-Loop approval. Your phone acts as a physical security key; no agent can execute code without your explicit "Hold to Approve" confirmation.

5. Kernel-Level Sandbox

Tamer confines every agent process inside a kernel-enforced sandbox. The agent physically cannot reach files or syscalls outside the allowed perimeter.

Linux

  • Landlock LSM — filesystem access control
  • seccomp-bpf — syscall filtering
  • bubblewrap — optional user-namespace sandbox

Windows

  • Job Object — resource & process limits
  • Low Integrity Process — reduced privilege token
  • AppContainer — network & filesystem isolation

Open Source Transparency

Our CLI and Server are open source. You can audit every line of code to verify how we handle your data.

View Source on GitHub →