Skip to main content
Veto is Ona’s kernel-level enforcement engine for AI agents. It runs as a Linux Security Module (LSM) inside the environment kernel — below the agent, below userspace, where it cannot be bypassed or disabled by the LLM. AI agents can reason about security boundaries and actively work around them. Traditional runtime security operates above the agent, making it observable and evadable. Veto moves enforcement below the agent’s reach.

Capabilities

Why kernel-level

When enforcement operates above the agent, the agent can discover and circumvent it. Path-based deny lists are bypassed by renaming binaries. Userspace sandboxes can be disabled. Proxy-based DLP is avoided by encoding data differently. Veto enforces at the syscall level. The agent cannot unload the LSM, modify its configuration, or observe whether an action was flagged. The kernel is the last trust boundary before hardware.

See Veto in action

Leonardo walks through how Claude Code bypasses traditional guardrails and how Veto enforces controls from inside the kernel.

Learn more