/\_/\ ( o.o ) ~ zero secrets > ^ < /| |\ (_| |_)
Self-hosted or managed. Zero-trust by default. Your secrets never enter the sandbox.
$ curl -fsSL https://getpaws.dev/install.sh | bash
How it works
/\_/\ ( -.- ) zzZ > ^ <
Agents run in ephemeral Firecracker microVMs with zero secrets on disk, in env, or in memory. A per-VM TLS proxy intercepts outbound HTTPS and injects credentials on-the-fly.
Agent in VM: curl https://api.anthropic.com/v1/messages | |-- VM resolves api.anthropic.com (real IP) |-- iptables DNAT rewrites destination --> per-VM proxy |-- Proxy terminates TLS, reads SNI | |-- Domain in allowlist? | |-- YES: inject x-api-key header, forward to real API | |-- NO: drop connection (TCP RST) | |-- Agent sees normal HTTPS response Never saw the API key. Not in env, not in memory, not on disk.
Get started in minutes
Use our SDK from TypeScript, Python, or the CLI. Create a session, submit a workload, get results.
import { createClient } from '@paws/sdk'; const paws = createClient({ baseUrl: 'https://your-server:4000', apiKey: 'paws-...' }); const session = await paws.sessions.create({ snapshot: 'claude-code', workload: { type: 'script', script: 'Review this PR and post comments', env: {} }, }); console.log(session.value.sessionId); // → "a1b2c3..."
Features
Everything an AI agent needs to run safely, with nothing it shouldn't have.
What people build
Trigger agents on events, schedules, or API calls. Each runs in its own isolated VM with injected credentials.
Security architecture
/\_/\ ( o.o ) < in a box! | | +-----+ | | +-----+
Every outbound request from the VM passes through a per-VM TLS proxy. Credentials are injected at the network layer — never exposed inside the sandbox.
Any outbound request to a domain not in the allowlist gets a TCP RST. No cloud metadata endpoint, no lateral movement, no data exfiltration.
API request | v +-----------------------+ | Control Plane | Holds all secrets, | sessions, daemons, | credentials, policies | triggers, governance | +-----------+-----------+ | dispatch session | +-----------v-----------+ | Worker | Bare metal, /dev/kvm | | | +---vm-1-----------+ | | | Firecracker VM | | Zero secrets | | Agent + workload | | Ephemeral, disposable | | | | | | +---|---------------+ | | | | | +---v---------------+ | | | TLS Proxy | | Injects credentials | | Per-VM, ephemeral | | at the network layer | +-------------------+ | +-----------------------+
Open Source
paws is open source. Deploy on your own infrastructure, audit every line, and own your agent security stack.