The agent framework
built for cybersecurity
Define agents in YAML. Run them with six guardrails. Govern them across tenants. Python, Node.js, and Go.
Real workflows. Real automation.
ZAK agents handle the repetitive, high-volume security work so your team can focus on what matters.
CVE Triage
Ingest CVE feeds, prioritize by business context and asset criticality, auto-create remediation tickets.
Risk Quantification
Pull asset inventory, calculate FAIR-based risk scores, generate executive-ready reports automatically.
AppSec Scanning
Trigger SAST and SCA scans, deduplicate findings across tools, route actionable results to code owners.
Compliance Audit
Map controls to evidence sources, identify gaps against frameworks, produce audit-ready documentation.
Four steps to your first agent.
Define, implement, validate, and run — see each step come to life.
Define
YAML schemaImplement
Python agentValidate
Schema & guardrailsRun
In tenant context# Generated US-ADSL name: risk_quant version: "1.0" domain: risk_quantification tenant: acme llm: provider: anthropic model: claude-sonnet-4-6 tools: - fetch_assets - calc_risk - gen_report guardrails: max_tokens: 4096 require_approval: true sandbox: true
from zin_adk import BaseAgent, zak_tool class RiskAgent(BaseAgent): @zak_tool("Fetch asset inventory") def fetch_assets(self, tenant): return self.sif.query( "assets", tenant=tenant ) @zak_tool("Calculate FAIR risk") def calc_risk(self, asset_id): return self.risk_engine.fair( asset_id ) @zak_tool("Generate report") def gen_report(self, scores): return self.reporter.pdf( scores )
US-ADSL Schema
All required fields present and correctly typed
LLM Provider
anthropic/claude-sonnet-4-6 configured and reachable
Tools Registered
3 tools found: fetch_assets, calc_risk, gen_report
Token Limit
max_tokens guardrail set to 4096
Approval Gate
require_approval enabled — human-in-the-loop active
Sandbox Mode
Tool execution sandboxed — no direct system access
Built for security. Not bolted on.
Generic agent frameworks weren't designed for cybersecurity. ZAK was.
| Capability | ZAK | LangChain | CrewAI | AutoGen |
|---|---|---|---|---|
| Declarative agent schema (YAML) | ✓ | ✕ | ✓ | ✕ |
| Security-domain guardrails (sandbox, approval gates) | ✓ | DIY | basic | Docker |
| Multi-tenant namespace isolation | ✓ | ✕ | ✕ | ✕ |
| Built-in audit logging (every tool call) | ✓ | via LangSmith | external | external |
| Security Intelligence Graph (SIF) | ✓ | ✕ | ✕ | ✕ |
| Policy engine enforced on every tool call | ✓ | ✕ | ✕ | ✕ |
| Pre-built cybersecurity domain agents | ✓ | ✕ | ✕ | ✕ |
Before & after ZAK
Watch each pain point transform into its solution.
@zak_tool decorator, outputs executive PDF reports on demand@zak_tool callOne install. Three languages.
pip install zin-adk
supported
guardrails
agents
Common questions
@zak_tool call, a Security Intelligence Fabric (SIF) graph for persistent security context, multi-tenant namespace isolation, and pre-built agents for risk quantification, vulnerability triage, and application security.pip install zin-adk (Python), npm install zin-adk (Node.js), or Go. Then scaffold your first agent with zak init --name "My Agent" --domain my_domain, validate with zak validate, and run with zak run agents/my-agent.yaml --tenant my_org.Ready to automate your
security workflows?
One install. Three languages. Infinite possibilities.
Open source. Apache 2.0. Forever.