💬 Submit Tasks From Anywhere
LegionForge meets you where you already are. Every interface connects to the same secure execution pipeline.
⛓ Crystallization Pipeline
When agents solve the same deterministic problem repeatedly, LegionForge crystallizes the solution into a signed, containerized tool — zero LLM overhead for routine work.
The Pre-HITL Analyzer runs AST guards (subscript bypass, MRO traversal, globals()/locals() hijack) and behavioral diffs before any human reviews a proposal. No tool reaches production without human approval.
🛡 Guardian Security Sidecar
A standalone FastAPI process (:9766) with a deterministic-only 7-check pipeline on every tool call. No LLM calls. Unpoisonable. Fails safe to halt on any error.
Check 0 — Revocation
REVOKED tools are blocked before any other check. Cache TTL: 10 seconds — revocation takes effect in under 10s without any restart.
Check 1 — Registry + Hash
Tool must be APPROVED in the registry. SHA-256 hash must match the registration record exactly.
Check 2 — Capability Boundary
Negative capability list blocks unauthorized tool categories per agent profile. Agent cannot call what it wasn't granted.
Check 3 — Destructive Patterns
Regex detection of destructive command patterns in tool arguments — caught before execution, not after.
Check 4 — Sequence Contract
Agent tool sequences are registered at startup. Deviations trigger the sandbox retry tier — never a silent pass.
Check 5 — Ed25519 Signature
Crystallized tools must carry a valid Ed25519 signature from the operator-held signing keypair.
Check 6 — Adaptive Rules
Human-approved threat rules from the Threat Analyst agent hot-reload every 10 seconds. No Guardian restart needed.
⚠️ Threat Coverage
🔑 Multi-Provider Authentication
Five auth backends — swap without touching agent code. Set gateway.auth_provider in your hardware profile YAML.
API Key (default)
bcrypt-hashed Bearer tokens stored in PostgreSQL. make create-user generates keys with optional daily budget.
OIDC
Google, Okta, Auth0, Azure AD, Keycloak, Cognito — any standards-compliant OIDC provider.
GitHub OAuth
GitHub OAuth app tokens. Identity stored as github:<user-id>.
LDAP
OpenLDAP, Active Directory. HTTP Basic auth. Supports bind DN + search base configuration.
Kerberos / GSSAPI
Full MIT Kerberos implementation. Negotiate auth. Requires OS-level KDC + keytab. See docs/SCALING.md.
🗺 Phase Roadmap
All phases complete.
⚡ Quick Start
git clone https://github.com/LegionForge/LegionForge.git
cd LegionForge
make check
make db-init
make test-smoke
# ✓ 2247 passed in ~21s
make start
# open http://localhost:8080/ui
📬 Status
⚠ v0.7.1-alpha — Active Development. This project is not yet at a stable 1.0 release. APIs and configuration formats may change before v1.0.0.
The security stack, gateway, and operator dashboard are functionally complete and tested. 2247/2247 tests passing. Phases 0–381 + G1–G4 complete, plus web browser tools, Guardian v0.2.0 on PyPI, full agent memory model (all 5 gaps — OpenClaw parity), multi-modal image input (Phase I), session continuity sidebar (Phase H), 4 UI themes, and targeted security hardening (8 fixes — timing oracle, SSRF, log injection, budget atomicity). Active development toward v1.0.0 public release.
The source will be available at github.com/LegionForge/LegionForge after UAT completes. Bugs, questions, and commercial licensing inquiries via GitHub Issues or jp@legionforge.org. Security vulnerabilities: coordinated 90-day disclosure window — email security@legionforge.org.