Your AI.
Your rules.
Proven.
Halyn sits between your AI agents and your system. Every action intercepted. Every decision auditable. The AI cannot bypass it.
Dashboard at localhost:7420 Β· Nothing leaves your machine
Halyn sits between your AI agents and your system. Every action intercepted. Every decision auditable. The AI cannot bypass it.
Dashboard at localhost:7420 Β· Nothing leaves your machine
Claude, GPT-4.1, Gemini 3.1 β they access your files, send your emails, control your browser. With no independent proof.
1,184 malicious AI skills were found in February 2026, exfiltrating API keys and credentials.
No independent verifiable proof your agent did only what you intended.
Every action intercepted, signed, stored in tamper-evident chain. Locally. No cloud.
Halyn intercepts at the API level, filesystem level, and process level simultaneously.
All cloud AI calls pass through a local proxy on 127.0.0.1. Rules apply before the request reaches the provider.
inotify / FSEvents / ReadDirectoryChanges. Every file access captured before execution, on any OS.
Halyn runs as a separate system user. SHA-256 hash chain, AES-256 encrypted. Agents cannot touch it.
Flagged actions surface in the dashboard. One click to approve or block. The agent waits.
Cloud, local, agentic β Halyn governs them all out of the box.
Halyn implements two open protocols. Any system can adopt them independently.
The accountability layer MCP and A2A donβt have. Identity, Provenance, Authorization, Audit.
6 rules no AI can break. Safety standard for agents in physical and connected systems.
No account. No cloud. Your data stays local.