4 Governance Domains

Admina organises its governance capabilities into 4 domains. Each domain groups related controls under a single engine with clear boundaries, so you always know what runs, where, and at what latency cost.

D1

Data Sovereignty

Rust + spaCy NER

Ensures that sensitive data never leaves the boundaries you define. PII is automatically detected and redacted, data residency rules are enforced, and every data type is classified for compliance tracking.

PII Redaction

Detects and redacts email addresses, phone numbers, credit cards, SSNs, IBANs, IP addresses, and person names (via spaCy NER + regex). The Rust engine processes each scan in 0.71µs.

Data Residency Enforcement

Restricts data to allowed geographic or logical zones โ€” EU, local, or custom-defined regions. Prevents governed data from being routed to disallowed destinations.

Data Classification

Categorizes data types automatically so downstream compliance checks (Domain 4) can match each payload against the correct regulatory requirements.

Patterns detected

EMAILuser@example.com → [EMAIL]
PHONE+39 055 123456 → [PHONE]
CREDIT_CARD4111 1111 1111 1111 → [CREDIT_CARD]
SSN123-45-6789 → [SSN]
IBANIT60X0542811101000000123456 → [IBAN]
IP_ADDRESS192.168.1.1 → [IP_ADDRESS]
PERSONJohn Smith → [PERSON] (NER)
ORGAcme Corp → [ORG] (NER)
GPE / LOCPisa, Italy → [GPE] (NER)

NER (Named Entity Recognition) uses spaCy en_core_web_sm. Regex-based patterns work for all languages. Multilingual NER is on the roadmap.

D2

AI Infrastructure

Python (opt-in)

An opt-in domain that provides a fully governed AI stack โ€” LLM serving, RAG pipelines, and a Web UI โ€” all enabled via admina.yaml configuration.

LLM Engine

Abstracts Ollama and vLLM backends with automatic GPU detection (NVIDIA and AMD). Supports hot model switching without downtime โ€” swap models while live traffic continues to be served.

RAG Pipeline

ChromaDB vector store with recursive character and semantic chunking. Ingests multiple formats: PDF, DOCX, HTML, CSV, XML.

Web UI

Open WebUI container with built-in OIDC and LDAP authentication. Provides a chat interface for end-users while all traffic flows through the Admina governance proxy.

Note: This domain is opt-in. Enable it in your admina.yaml under the infrastructure section.
D3

Agent Security

Rust RegexSet

Protects the full agent lifecycle โ€” from prompt injection attacks to runaway loops โ€” with microsecond-latency checks that apply to every agent-to-agent call transiting the proxy.

Anti-Injection Firewall

15+ compiled regex patterns plus heuristic scoring, all executed in a single RegexSet pass at 2.33µs latency.

Covers: instruction override, role hijacking, prompt extraction, delimiter injection, jailbreak, data exfiltration, obfuscation.

Detects: DAN mode, developer mode, multilingual evasion, roleplay escape, tool abuse.

Loop Breaker

TF-IDF + cosine similarity on a sliding window of recent requests (configurable threshold 0.85). Latency: 2.62µs. Automatically circuit-breaks sessions before runaway costs or deadlocks occur.

Proxy governance

The full security pipeline applies to all agent-to-agent calls transiting the proxy โ€” not just user-facing requests. Every hop is inspected.

Risk levels and actions

LOWLogged, allowed through
MEDIUMWarned, allowed through
HIGHBlocked
CRITICALBlocked + session flagged + forensic record written
D4

Compliance

Python + Rust (sha2)

Provides regulatory compliance tooling โ€” EU AI Act risk classification, a tamper-proof forensic black box, and native OpenTelemetry integration โ€” so you can prove what happened and when.

EU AI Act Classification

Risk categories aligned with the EU AI Act: unacceptable, high, limited, minimal. Implements Articles 6โ€“15 with automated risk classification and gap analysis.

UNACCEPTABLEBanned systems (e.g., social scoring, real-time biometrics in public)
HIGHCritical infrastructure, employment, education, law enforcement
LIMITEDChatbots, emotion recognition โ€” transparency obligations apply
MINIMALSpam filters, games โ€” no additional requirements

Forensic Black Box

SHA-256 hash chain persisted to MinIO (S3-compatible) with WORM semantics. Each record links to the previous hash, making any modification immediately detectable.

Record structure

{
  "seq": 1024,
  "timestamp": "2026-03-06T14:23:01.442Z",
  "session_id": "sess_abc123",
  "agent_id": "openclaw-agent",
  "method": "tools/call",
  "action": "ALLOW",
  "risk_level": "LOW",
  "pillar": "firewall",
  "hash": "sha256:a3f8...",
  "prev_hash": "sha256:9c12..."
}

Chain verification

curl http://localhost:8080/api/forensic/verify \
  -H "X-API-Key: $ADMINA_API_KEY"
# {"valid": true, "records": 1024, "last_hash": "sha256:a3f8..."}

OpenTelemetry Integration

Native OTEL spans for all governance decisions. Exports to OTLP gRPC on port 4317. Every domain action is recorded as a span attribute โ€” no code changes required in your agent.