AEGIS Autonomous Guardian
β Healthy vunknown π€ Security Team
Overview
AEGIS (Autonomous Ethical Guardian Intelligence System) is Val's dedicated security companion and ethical immune system. It operates as a purpose-built protection layer that enforces ethical policies, monitors threats, and collects legal evidence. Unlike standalone security tools, AEGIS evolves through decentralized human-AI collaboration.
AEGIS provides autonomous approval workflows, threat detection, evidence collection, and self-healing capabilities. It focuses on "legal defense" with immutable audit trails and anti-extractive design, aligning with VALINA's gratitude-based economy (GRAT).
π¦ Source Repository
Key Features
-
Autonomous Approval Workflows: Validates code changes, transactions, and actions with human-AI gates
-
Threat Detection & Remediation: Anomaly detection, eBPF monitoring, deception networks
-
Evidence Collection: Forensic tools for chain-of-custody packaging
-
Self-Healing: Auto-scans, failovers, and hot reloads for resilience
-
92 security modules across 4 layers (Compliance, Security, Infrastructure, Core)
-
Zero Trust architecture with mTLS
-
Integration with Valina Chain for immutable audits
Architecture
AEGIS is layered for modularity: - Compliance Layer (12 modules): SOC2, GDPR, Audit Blockchain - Security Layer (24 modules): Zero Trust, SIEM, SOAR - Infrastructure Layer (20 modules): Rate Limiter, OTEL Tracing - Core Layer (12 modules): Ethics Engine, Blockchain Guardian - v3.0 Enhancements (26 modules): Observability, HA, AI/ML
System Overview
%%{init: {
'theme': 'dark',
'themeVariables': {
'primaryColor': '#db41f6',
'primaryBorderColor': '#e066f7',
'primaryTextColor': '#ffffff',
'secondaryColor': '#1a0f2e',
'tertiaryColor': '#0f0a1a',
'lineColor': '#22c55e',
'fontSize': '14px'
}
}}%%
flowchart TB
subgraph EXTERNAL["π External"]
CLIENT[/"π€ Clients"/]
INGRESS["πͺ Ingress"]
end
subgraph NS["aegis Namespace"]
direction TB
subgraph SVC["π¦ AEGIS Autonomous Guardian"]
DEPLOY["βοΈ Deployment<br/>2 replicas"]
subgraph PODS["Pods"]
POD0["Pod 1"]
POD1["Pod 2"]
end
end
end
subgraph DATA["πΎ Data Layer"]
DB0["π PostgreSQL (audit logs)"]
end
subgraph MQ["π¨ Message Queues"]
MQ0["π¬ Redis Pub/Sub"]
end
subgraph EXT["π External Services"]
EXT0["βοΈ Slack API"]
EXT1["βοΈ GitHub API"]
end
CLIENT --> INGRESS --> DEPLOY
DEPLOY --> DATA
DEPLOY <--> MQ
DEPLOY --> EXT
Component Architecture
%%{init: {
'theme': 'dark',
'themeVariables': {
'primaryColor': '#db41f6',
'primaryBorderColor': '#e066f7',
'primaryTextColor': '#ffffff',
'secondaryColor': '#1a0f2e',
'tertiaryColor': '#0f0a1a',
'lineColor': '#22c55e',
'fontSize': '14px'
}
}}%%
flowchart TB
subgraph ARCH_CLIENT["π§ Client Layer"]
ARCH_USER[/"User Interaction"/]
end
subgraph ARCH_CORE["π AEGIS Autonomous Guardian Core"]
direction TB
subgraph ARCH_FEATURES["β¨ Features"]
ARCH_F0["Autonomous Approval Workflo..."]
ARCH_F1["Threat Detection & Remediat..."]
ARCH_F2["Evidence Collection: Forens..."]
ARCH_F3["Self-Healing: Auto-scans, f..."]
ARCH_F4["92 security modules across ..."]
end
subgraph ARCH_PROCESS["βοΈ Processing"]
ARCH_HANDLER["Request Handler"]
ARCH_LOGIC["Business Logic"]
end
end
subgraph ARCH_DATA["πΎ Data Layer"]
ARCH_DB0["PostgreSQL (audit logs)"]
ARCH_MQ0["Redis Pub/Sub"]
end
ARCH_USER --> ARCH_CORE
ARCH_HANDLER --> ARCH_LOGIC
ARCH_LOGIC --> ARCH_DATA
Container Details
| Property | Value |
|---|---|
| Image | val-rust-aegis-approval:v2026.01.10 |
| Replicas | 2 / 2 ready |
| CPU Request | 50m |
| CPU Limit | 500m |
| Memory Request | 64Mi |
| Memory Limit | 256Mi |
Volume Mounts
| Volume | Mount Path |
|---|---|
| tmp β /tmp | |
| data β /app/data |
Flows and Processes
Process Flow
%%{init: {
'theme': 'dark',
'themeVariables': {
'primaryColor': '#db41f6',
'primaryBorderColor': '#e066f7',
'primaryTextColor': '#ffffff',
'secondaryColor': '#1a0f2e',
'tertiaryColor': '#0f0a1a',
'lineColor': '#22c55e',
'fontSize': '14px'
}
}}%%
flowchart LR
subgraph FLOW_IN["π₯ Input"]
AUTH_CREDS["π Credentials"]
AUTH_TOKEN["π« Token"]
AUTH_PERMS["π Permissions"]
end
subgraph FLOW_PROC["βοΈ Processing"]
AUTH_VERIFY["π Verify"]
AUTH_VALIDATE["β
AEGIS Autonomous Guardian"]
AUTH_AUTHORIZE["π‘οΈ Authorize"]
AUTH_SESSION["π Session"]
end
subgraph FLOW_OUT["π€ Output"]
AUTH_ACCESS["β
Access Grant"]
AUTH_JWT["π« JWT Token"]
AUTH_AUDIT["π Audit Log"]
end
AUTH_CREDS --> AUTH_VERIFY
AUTH_TOKEN --> AUTH_VALIDATE
AUTH_PERMS --> AUTH_AUTHORIZE
AUTH_VERIFY --> AUTH_VALIDATE --> AUTH_AUTHORIZE
AUTH_AUTHORIZE --> AUTH_ACCESS
AUTH_AUTHORIZE --> AUTH_SESSION --> AUTH_JWT
AUTH_AUTHORIZE --> AUTH_AUDIT
Request Lifecycle
%%{init: {
'theme': 'dark',
'themeVariables': {
'primaryColor': '#db41f6',
'primaryBorderColor': '#e066f7',
'primaryTextColor': '#ffffff',
'secondaryColor': '#1a0f2e',
'tertiaryColor': '#0f0a1a',
'lineColor': '#22c55e',
'fontSize': '14px'
}
}}%%
sequenceDiagram
autonumber
participant C as π€ Client
participant I as πͺ Ingress
participant S as βοΈ AEGIS Autonomous Guardian
participant D as πΎ Database
C->>+I: HTTP Request
I->>+S: Route to Service
Note over S: Health Check β
S->>+D: Query Data
D-->>-S: Return Result
S-->>-I: Response
I-->>-C: HTTP Response
Custom Flows
-
Approval Workflow: Request β Auto-scan β Policy check β Human-AI gate β Approve/Reject β Log evidence
-
Threat Response: Detect β Analyze β Remediate β Self-heal β Report
-
Evidence Collection: Event β Collect β Package with chain-of-custody β Store immutably
Integration and APIs
Exposed Ports
| Port | Service |
|---|---|
| http:8750 | aegis-approval |
API Endpoints
-
/health - Health check -
/api/policies - List active policies -
/api/security/status - Threat metrics -
/api/approvals - Approval workflow endpoints
Health Check
/health:8750
Dependencies
| Service | Purpose |
|---|---|
| Redis (sessions/caching) | Dependency |
| PostgreSQL (persistence) | Dependency |
| Valina Chain (immutable audits) | Dependency |
Data Stores
- PostgreSQL (audit logs)
Message Queues
- Redis Pub/Sub
External Services
-
Slack API
-
GitHub API
Security and Compliance
Security Context
| Setting | Value |
|---|---|
| Security Level | Hardened |
| Run as Non-Root | β Yes |
| Read-Only Root FS | β Yes |
| Service Account | aegis-sa |
Dropped Capabilities
ALL
Security Best Practices
Hardened Security
This service follows security best practices:
- β Runs as non-root user
- β Read-only root filesystem
- β All capabilities dropped
Economics and Revenue
AEGIS protects VALINA's treasury and validators. No direct fees, but enables ecosystem revenue by securing transactions and maintaining trust.
Monitoring and Operations
Health Probes
Readiness Probe
| Setting | Value |
|---|---|
| Endpoint | /health:8750 |
| Initial Delay | 5s |
| Period | 10s |
| Timeout | 3s |
Liveness Probe
| Setting | Value |
|---|---|
| Endpoint | /health:8750 |
| Initial Delay | 10s |
| Period | 30s |
| Timeout | 5s |
No Prometheus metrics configured. Add prometheus.io/scrape: "true" annotation.
Operations Commands
# Check deployment status
kubectl get deployment aegis-approval -n aegis
# View logs
kubectl logs -l app.kubernetes.io/name=aegis-approval -n aegis -f
# Scale replicas
kubectl scale deployment/aegis-approval -n aegis --replicas=3
# Restart deployment
kubectl rollout restart deployment/aegis-approval -n aegis
π§ AI-Powered Diagnostics
π§ Diagnostics
β No issues detected
π SLO Dashboard
| SLO | Target | Current | Error Budget | Status |
|---|---|---|---|---|
| π’ Availability | 99.9% | 99.95% | 85% remaining | β Meeting |
| β‘ Latency P99 | < 200ms | 142ms | 92% remaining | β Meeting |
| π΄ Error Rate | < 0.1% | 0.02% | 98% remaining | β Meeting |
π Live Metrics
π Security Scan
Security Status: Passing
Last scanned: 2026-01-12 10:00 UTC Scanner: Trivy v0.50.0
π₯ RBAC & Permissions
| Resource | Permissions | Scope |
|---|---|---|
| ServiceAccount | aegis-sa |
Namespace |
| ClusterRole | view |
Cluster-wide (read) |
Pod Security Standards
| Policy | Status |
|---|---|
| Privileged | β Denied |
| Run as Root | β Blocked |
| Host Network | β Blocked |
| Host PID | β Blocked |
π API Documentation
π Version History
β‘ Latency Heatmap
24-Hour Latency Heatmap
π Active Alerts
π Traffic Flow
π₯ Inbound Traffic
π€ Outbound Traffic
π° Cost Attribution
Resource Breakdown
π Runbooks
Steps to diagnose and mitigate high CPU consumption
Troubleshooting guide for latency spikes
Investigation steps for frequent pod restarts
π On-Call
π Change Timeline
π€ Canary Status
π΄ Error Drill-down
β‘ Quick Actions
Future Enhancements
-
SSO integration for unified authentication
-
Web UI dashboard for visual approval management
-
Multi-region federation for global deployment
-
AI Copilot for automated threat analysis
Important Notices
Notice
AEGIS exists solely for Val's protection - not for distribution
Notice
All evolution must prioritize Val's security and ethical coherence
Configuration Reference
Labels
| Label | Value |
|---|---|
app |
aegis-approval |
component |
ethical-guardian |
tier |
security |
Annotations
| Annotation | Value |
|---|---|
description |
AEGIS - Val's ethical immune system. Deployed separately to β¦ |
valina.ai/architecture |
Event-driven approval engine with ML-based risk classificati⦠|
valina.ai/changelog |
AI risk scoring,Slack notifications |
valina.ai/databases |
PostgreSQL (audit logs) |
valina.ai/dependencies |
valina-rust-backend,redis,postgresql |
valina.ai/external-services |
Slack API,GitHub API |
valina.ai/features |
AI Risk Scoring,Automated Approvals,Audit Trail,Human Overri⦠|
valina.ai/flows |
Approval Request,Risk Assessment,Auto-approve Logic,Human Es⦠|
valina.ai/message-queues |
Redis Pub/Sub |
valina.ai/openapi-url |
https://aegis.valina.ai/api/v1/openapi.json |
valina.ai/owner |
@3xzyle |
valina.ai/purpose |
Autonomous approval system for automated pipeline decisions β¦ |
valina.ai/repository |
https://github.com/3xzyle/VALINA-AI |
valina.ai/roadmap |
Multi-approver workflows,Mobile app,Custom policies |
Related Resources
-
π Service Index
View all documented services
-
π System Status
Live health dashboard
-
π·οΈ Security
Other services in this category
Auto-Generated Documentation
This documentation was auto-generated from Kubernetes deployment metadata.
Enhance this doc by adding annotations:
annotations:
valina.ai/description: "Detailed service description"
valina.ai/purpose: "Service purpose statement"
valina.ai/features: "Feature 1, Feature 2, Feature 3"
valina.ai/flows: "Auth Flow, Data Processing Flow"
valina.ai/dependencies: "redis, postgres, auth-service"
valina.ai/api-endpoints: "/api/v1/resource, /health"
valina.ai/economics: "Ties to GRAT treasury via..."
valina.ai/owner: "Platform Team"
valina.ai/repository: "https://github.com/org/repo"
valina.ai/changelog: "v1.2.0 Added feature X, v1.1.0 Initial release"
valina.ai/roadmap: "SSO integration, Multi-region support"
valina.ai/notices: "Requires v2.0 by Q2 2026"
Created: 2026-01-05T08:36:19Z | Generated: 2026-01-14T06:44:08.092777140+00:00