Security

Automation designed to operate within limits.

Kerngo does not give KernAI an unrestricted terminal. It works with defined actions, risk policies, confirmations and audit trails.

No unrestricted terminal

KernAI does not improvise arbitrary commands or operate as root without control.

Predefined actions

Each permitted action is modeled, parameterized and limited.

Risk policies

Tasks are classified by impact and required approval level.

Human confirmation

Sensitive actions wait for explicit review and approval.

Logs and audit

Everything is recorded so decisions and results can be reconstructed.

Protected credentials

Access is managed with protection practices and least privilege.

Execution limits

Timeouts, scope limits and controls reduce unexpected operations.

Observer mode

Diagnose without making changes to the server.

Correct automation depends on context.

Restarting a queue is not the same risk as touching firewall rules, deleting files or changing configuration. Kerngo separates observation, proposal and execution so every decision receives the right level of control.

Low riskLog queries, metrics and service status.Automatable
Medium riskRetries, worker restart and temporary cleanup.Confirmation
High riskNetwork changes, broad deletions and critical permissions.Mandatory review