← Back to Catalog

LucidAkshay/kavach

↗ GitHub

Tactical AI Workspace Monitor & EDR

234

Stars

42

Forks

1

Watchers

0

Open Issues

TypeScript·GNU General Public License v3.0·Last commit Mar 19, 2026·by @LucidAkshay·Published April 1, 2026·Analyzed 6d ago
A

Safety Rating A

Kavach appears to be a legitimate open-source security tool. Its capabilities (process termination, clipboard manipulation, file redirection) are powerful but are clearly documented as intentional EDR defense mechanisms. No hardcoded secrets, obfuscated code, data exfiltration patterns, or prompt injection attempts were found in the provided content. The project is GPLv3-licensed and authored transparently. The elevated system privileges requested (Administrator on Windows, Full Disk Access on macOS) are consistent with the stated security monitoring purpose.

AI-assisted review, not a professional security audit.

AI Analysis

Kavach (Sanskrit for 'Armor') is an open-source Endpoint Detection and Response (EDR) desktop application built with Tauri v2, Rust, and React, designed to monitor, restrain, and remediate autonomous AI agents and local LLMs operating on a local machine. It provides a userland file system observer that intercepts destructive operations, routes them to a phantom directory, and offers forensic tools including cryptographic audit logs, temporal rollback, honeypot tripwires, clipboard entropy analysis, PII sanitization, and supply chain CVE scanning against package.json dependencies.

Use Cases

  • Monitoring autonomous AI agent activity on a local workstation to detect and quarantine destructive file operations
  • Protecting sensitive files and secrets from rogue or hallucinating LLM agents operating locally
  • Forensic auditing of AI agent actions via an immutable cryptographic log chain
  • Detecting and preventing clipboard-based secret exfiltration during AI agent sessions
  • Scanning workspace dependencies for known malicious or vulnerable packages in real time

Tags

#security#ai-agents#desktop-app#llm#monitoring#local-first#observability

Security Findings (4)

hardcoded_secrets

No hardcoded secrets, API keys, or tokens were detected in the provided repository content. The README references a honeypot decoy file 'system_auth_tokens.json' which is described as synthetic bait data, not real credentials.

malicious_code

No malicious code patterns detected. Features such as OS process termination (WMIC, renice), clipboard overwriting, and child process restriction are documented as intentional security defense mechanisms and appear consistent with the stated EDR purpose.

dependency_vulnerabilities

No manifest files were provided for static analysis. The README mentions a built-in supply chain auditor that scans workspace package.json for CVEs, but no dependency manifests for Kavach itself were available to assess.

prompt_injection_attempt

No prompt injection attempts detected in the README or metadata. Content is straightforwardly descriptive of the application's features and architecture.

Project Connections