Iddio v2026.0217 — First Release
The first public release of Iddio is here. 5-tier classification, mTLS with SPIFFE, JIT credentials, hash-chained audit, session recording, and multi-protocol support for Kubernetes, SSH, Terraform, Helm, and AWS CLI.
What Shipped
Iddio v2026.0217 is the first public release. It includes everything from Phase 1 and Phase 2, plus the multi-protocol extensions from Phase 4. Here’s what’s in the box.
5-Tier Request Classification
Every command is classified into one of five tiers based on method, resource type, and blast radius:
- T0 OBSERVE — reads, auto-allowed
- T1 OPERATE — pre-approved runbook operations
- T2 MODIFY — standard writes, escalated
- T3 SENSITIVE — deletes and secret access, escalated
- T4 BREAK-GLASS — exec, RBAC mutations, blocked by default
Classification is sub-millisecond with zero allocations.
mTLS with SPIFFE URIs
Each agent gets a client certificate signed by iddio’s CA, with identity embedded as a SPIFFE URI: spiffe://iddio.local/agent/claude-code. No shared secrets on the wire.
JIT Credentials via TokenRequest
The proxy mints 5-minute Kubernetes tokens on every request using the TokenRequest API. No long-lived cluster credentials are stored.
Hash-Chained Audit Log
Every event links to its predecessor via SHA-256 hash. Tamper with one line, and iddio audit verify catches it. Append-only JSONL format with agent identity, tier, decision, and latency on every entry.
Session Recording
Two complementary systems:
- Exec sessions — raw byte-stream capture of
kubectl execandkubectl attach - API sessions — structured request/response body capture for all other API calls
Both include automatic secrets redaction and forensic-quality replay.
Multi-Protocol Support
Beyond Kubernetes:
- SSH — JIT certificates, compound command classification, PTY relay
- Terraform — plan/apply/destroy classification, workspace scoping
- Helm — install/upgrade/rollback classification, release scoping
- AWS CLI — service and region scoping, IAM mutation detection
All protocols share the same policy engine, audit log, and approval workflow.
Policy Engine
YAML-based policy with namespace globs, per-agent rules, and runbook assignments. OPA/Rego integration available with the opa build tag.
Deployment Options
- Desktop app — native macOS app with visual policy editor and approval dialogs
- CLI proxy — single binary, runs in a terminal
- Helm chart — deploy to Kubernetes as a service
Install
# Desktop app (macOS)
brew install --cask leonardaustin/tap/iddio-desktop
# CLI proxy (macOS + Linux)
brew install leonardaustin/tap/iddio
What’s Next
Phase 3 focuses on the enterprise control plane: multi-cluster management, OIDC authentication, centralized RBAC, and a web dashboard with live audit feed. The open-source core remains free and unlimited.
Try It Yourself
Iddio is open source. Deploy a zero-trust command proxy for your AI agents in minutes.