Defense in depth. By design.
Sigil's security posture is six concentric layers, each independently enforced. WASM sandboxing isolates execution. Capability tokens scope every credential. Cryptographic identity binds every action to a DID. Policy enforcement gates spending and lineage. Hash-chained audit makes tampering provable. Entity classification triages incoming traffic. Breach the outer ring — the inner six still stand.
sigil · liverunning
Production-grade. Audit-ready.
OpenTelemetry traces, structured logs, hash-chained audit, fail-closed verification. Every byte of state is provable; every privileged path is checkable.