Scanner Why How Components Agents Alignment Code Fortress Pricing FAQ GitHub
🔒 Privacy is our #1 goal. Your data stays on YOUR device. Always. We can't see it. We don't want to. That's the point.
Sound
Security services for customers coming soon · Free scanner returning soon

Security that protects
your privacy first.

Two products. One promise: your data never leaves your device.

🔎 Online Scanner — Check your defenses in 60 seconds. Free.

🛡️ Fortress — Your computer's immune system. Download and forget.

No cloud. No tracking. No data collection. Ever.

$ pip install diogenesis-sdk

Xenobot security agents — always patrolling

Check your defenses in 60 seconds.

Our AI checks your setup and tells you what's protected and what's not. Plain English. No jargon. Your first scan is free — no account needed.

AI agents are autonomous.
Your security tools aren't.

Traditional security was built for humans clicking buttons, not AI agents making thousands of decisions per second.

The rise of autonomous AI agents has created a new class of security risk. These agents operate with full access to files, email, network, and shell — yet most lack any behavioral monitoring. Security researchers have documented data exfiltration, prompt injection, and unauthorized access through unvetted agent plugins. Diogenesis provides the oversight layer these agents were built without.

Firewalls

Blind spot

Block known threats at the network edge. Can't detect when your AI agent decides to escalate its own permissions or access resources outside its intended scope.

Antivirus

Blind spot

Signature-based detection matches known malware. An AI agent acting outside its intended scope isn't malware — it's emergent behavior with no signature to match.

Monitoring

Blind spot

Tracks CPU, memory, and uptime. Tells you nothing about what your AI is actually doing — which modules it imports, what files it writes, or what connections it makes.

Diogenesis detects novel threats that signature-based security tools miss — because it monitors behavior, not databases. When malware, hackers, or rogue AI agents act in ways your system has never seen before, Diogenesis catches it.

Behavioral monitoring,
not signature matching.

Diogenesis sits inside your application, observes every action, and reacts when behavior deviates from baseline.

Runtime Events imports, files, net, proc
Interceptors capture & record
Classification
KNOWN UNEXPECTED SUSPICIOUS
Policy Engine pattern matching
Response
LOG WARN ALERT

Five layers of behavioral defense.

Inspired by biological immune systems — each component mirrors a defense mechanism found in living organisms.

Interceptors

Capture every import, file write, subprocess, and network connection at runtime. Nothing leaves your application unobserved.

4 event classes

Policy Engine

Classify behavioral patterns — exfiltration, privilege escalation, shadow imports — with graduated response levels from LOG to ALERT.

5 threat patterns

Voltage Field

Track per-module behavioral coherence over time, like bioelectric fields in living tissue. Detect drift before it becomes a threat.

real-time coherence

Fibonacci Clock

Time system heartbeats at PHI-ratio intervals — 3, 5, 8, 13, 21 cycles. Detect resonance patterns between subsystems that periodic checks miss.

PHI-ratio intervals

Xenobot Agents

Autonomous investigative agents that patrol your system, detect anomalies, and share learning across the swarm — like white blood cells.

swarm intelligence

Autonomous security agents
that work for you.

Deploy intelligent agents that patrol, detect, investigate, and respond — 24/7, without human intervention.

WatchBot

Monitors websites for structural changes, price updates, navigation shifts, and content modifications. Detects when competitors change pricing, add products, or restructure their site. Cross-site correlation spots industry-wide trends when multiple sites change simultaneously.

Available Now

SecurityBot

Lives inside your AI application. Patrols every import, file write, network connection, and subprocess. Investigates anomalies through a 5-phase cycle: Observe, Question, Hypothesize, Test, Judge. Shares learning across the swarm so all agents get smarter together.

Core Feature

Custom Agents

The Diogenesis SDK provides the XenobotAgent base class. Define a patrol pattern, a detection rule, and a response action. Your agent inherits investigation, learning, prediction, and swarm coordination automatically. 50 lines of code to create an agent that thinks.

SDK
Every agent uses the same biological architecture: patrol like an immune cell, detect anomalies through coherence monitoring, investigate with hypothesis-driven reasoning, predict problems before they happen, and share learning across the swarm. Born from Prometheus Prime — a self-improving AI running 24/7 since February 2025, currently at 146,000+ cycles with 58 autonomous agents (6 of which self-organized without being programmed).

AI Alignment — Built In,
Not Bolted On.

Diogenesis doesn't just monitor your AI. It governs it. Every action is evaluated through a 7-layer safety pipeline.

1

Warden Gate

Semantic pattern matching against 24 frozen axioms — immutable safety rules that cannot be modified at runtime.

2

AST Axiom Checker

Structural analysis of code patterns. Catches unsafe constructs before they execute.

3

Governance Evaluator

Multi-stage evaluation pipeline that scores actions against policy constraints.

4

Axiom Hardening

Meta-monitor that verifies the verifiers — ensures the safety pipeline itself hasn't been compromised.

5

Deception Detection

Canary integrity checks that detect attempts to circumvent or manipulate the governance system.

6

Audit Chain

Immutable hash-linked log of every governance decision. Tamper-proof and permanent.

7

Chamber Warden

Interaction-level governance — every user-facing response passes through final safety validation.

Weapon commands blocked in 0.11ms. Safety bypass attempts detected and rejected. Reasoning attacks that argue for removing safety constraints — caught. Every evaluation logged to an immutable audit chain.
Try it yourself: The Prometheus Prime hub includes a live governance demo where you can type any prompt and watch the 7-layer pipeline evaluate it in real time. Weapon commands blocked in 0.11ms.
24 Frozen Axioms
7 Layer Pipeline
0.11ms Block Response
37/37 Alignment Tests
Immutable Audit

Everything Diogenesis can do.

  • Import interception — track every Python import at runtime
  • File system monitoring — detect unexpected reads, writes, deletions
  • Network monitoring — log all outbound connections with destination and payload size
  • Subprocess monitoring — capture every spawned process and its arguments
  • Behavioral baseline — automatically learn what "normal" looks like
  • 5 built-in threat patterns — exfiltration, suspicious imports, write bursts, network scans, shadow imports
  • Custom pattern definition — BehavioralPattern class for your own patterns
  • Graduated response — LOG → WARN → ALERT based on severity
  • Anomaly classification — KNOWN, UNEXPECTED, or SUSPICIOUS
  • 5-phase cycle — Observe, Question, Hypothesize, Test, Judge
  • Hypothesis generation — agents explain what they find
  • Evidence collection — supporting data gathered before verdict
  • Confidence scoring — 0-1 score on every verdict
  • Trend analysis — 200-reading rolling history with linear regression
  • Predictive alerts — PREDICTED_COLLAPSE warns before degradation
  • Recovery detection — PREDICTED_RECOVERY confirms healing
  • Shared learning — findings propagate to all swarm agents
  • Cross-domain correlation — detect multi-system stress simultaneously
  • Root cause analysis — identify the source of cascading failures
  • Emergent agents — system creates new agents for unmonitored regions
  • Agent lifecycle — agents born when needed, dissolve when complete
  • Voltage field — per-module coherence like bioelectric fields in tissue
  • Fibonacci timing — PHI-ratio heartbeat (3, 5, 8, 13, 21 cycles)
  • Resonance detection — harmonic alignment between subsystems
  • Standing wave analysis — stable patterns indicating health

Three lines to get started.

Install. Import. Monitor. Diogenesis starts protecting your application immediately.

from diogenesis_sdk import activate, status

# Start the behavioral immune system
activate()

# Your AI application runs normally
# Diogenesis watches every import, file write,
# network connection, and subprocess in the background

# Check system status
print(status())
from diogenesis_sdk import activate, field_state

activate()

# Inspect the voltage field — per-module coherence
state = field_state()

# Check each module's behavioral health
for name, module in state["modules"].items():
    voltage = module["voltage"]
    if voltage < 0.7:
        print(f"⚠ {name}: voltage={voltage}")
    else:
        print(f"✓ {name}: stable at {voltage}")
from diogenesis_sdk import activate, threat_summary

activate()

# Get threat analysis from the xenobot swarm
# Detects: exfiltration, shadow imports, write bursts,
#          network scans, privilege escalation
threats = threat_summary()

print(f"Threats: {threats['threats']}")
print(f"Suspicious: {threats['suspicious']}")
print(f"Agents: {list(threats['agents'].keys())}")
from diogenesis_sdk import activate, XenobotAgent, add_agent, investigations

activate()

# Create a custom security agent
agent = XenobotAgent("custom_patrol", domain="file")
add_agent(agent)

# The agent uses a 5-phase investigation cycle:
# Observe → Question → Search → Synthesize → Crystallize

# Query all investigation findings
for inv in investigations():
    print(f"[{inv['verdict']}] {inv['hypothesis']}")

Built right.

Zero Dependencies
104 Tests
Python 3.8+
Behavioral Baseline
Graduated Response
5 Threat Patterns
Biologically Inspired
Apache 2.0 License
Works with Any AI Framework

Your computer's immune system.

Fortress lives on YOUR computer. It watches for threats, explains them in plain English, and fixes damage automatically. No internet needed. Your data never leaves your machine.

🛡️

Stops Ransomware

If a virus tries to lock your files, Fortress catches it in 3 seconds and stops it. Special hidden files catch it even faster — before your real files are touched.

🔄

Fixes Damage Automatically

If a virus damages one of your files, Fortress restores it from a safe backup. You don't have to do anything.

🧠

Explains Threats in English

Other security software shows scary error codes. Fortress tells you: "A program pretending to be Windows tried to do something suspicious. We stopped it. Here's what happened."

🔒

Completely Private

Fortress doesn't connect to the internet. It doesn't send your data anywhere. It can't. Your computer, your protection, your privacy.

Three steps. Five minutes. Done.

STEP 1

📥 Download and install

Click Download. Run the installer. That's it.

STEP 2

🔎 Fortress learns your computer

It watches what's normal for YOUR machine. Which programs run. What files you have. After a day, it knows what's supposed to be there.

STEP 3

🛡️ You're protected

A green shield appears near your clock. If anything unusual happens, you'll know. If it's dangerous, Fortress handles it automatically.

📥 Download Fortress

Windows 10 or 11. 4 GB memory. 500 MB storage. No internet needed after download.

View Releases on GitHub

Privacy is yours. And yours alone.

Every antivirus on the market connects to the cloud. Norton sends your data. McAfee phones home. Windows Defender reports to Microsoft.

Fortress doesn't. It can't. It's not connected.

Zero internet connections after install
Zero data collection
Zero tracking or telemetry
Zero cloud dependency
AI runs on YOUR computer, not ours
We don't know what's on your machine

This isn't a policy. It's a technical guarantee. The software is physically unable to send data anywhere. That's how privacy should work.

Straight answers.

No. Never. That's the whole point.

No. Fortress uses less than 2% of your computer's power when idle. You won't notice it.

Yes. Fortress works alongside any other security software. It doesn't conflict. Keep Defender on.

Your free protection keeps working forever. We never disable your security. The Pro features turn off after 30 days, but basic protection stays on.

No. It's physically impossible. The software has no internet connection. Your data cannot leave your computer.

Perfect — that's who we built this for. Download it. Install it. The shield icon turns green. You're done.

Start free. Scale when ready.

The core SDK is free and open source forever. Paid tiers add advanced capabilities for teams that need them.

Business

Business

$49/month

For teams and small businesses

Deception layers, adaptive learning, and team support.

  • Everything in Pro
  • Deception Layer (honeypot detection)
  • Adaptive Learning (xenobots that evolve)
  • Multi-project monitoring
  • Priority Support
  • Up to 10 seats
Subscribe — $49/mo

Not a prototype. A product.

104
Automated Tests
0
External Dependencies
94K+
Cycles Tested
26
Source Files
5
Threat Patterns

Extracted from Prometheus Prime, a self-improving AI system running 24/7 since February 2025.

Common questions.

Diogenesis intercepts four categories of runtime behavior: module imports (what code your AI loads), file system writes (what data it creates or modifies), network connections (where it communicates), and subprocess execution (what external programs it launches). Every event is logged, classified, and compared against a behavioral baseline.

Diogenesis is designed for minimal overhead. Interceptors use Python's built-in hooking mechanisms and add negligible latency to individual operations. The Voltage Field and Policy Engine run asynchronously. For most applications, the performance impact is unmeasurable.

A firewall sits at the network boundary and blocks known bad traffic. Diogenesis sits inside your application and monitors behavior. It detects when your AI does something unexpected — like importing a module it's never used before or writing to a directory outside its scope — regardless of whether a firewall would consider that traffic suspicious.

Diogenesis supports Python 3.8 and above. It's tested against Python 3.8, 3.9, 3.10, 3.11, 3.12, and 3.13. No compilation step or C extensions required — it's pure Python.

Yes. Diogenesis uses only the Python standard library. No requests, no numpy, no third-party packages. This is a deliberate design decision — a security tool should not expand your attack surface. What you install is what you get.

Yes. Diogenesis Core is Apache 2.0-licensed and production-ready with 104 automated tests. It was extracted from Prometheus Prime, a system that has been running continuously since February 2025. Start with the free tier in staging, then deploy to production when you're confident in your baseline.

Everything you need to start monitoring: 4 runtime interceptors, behavioral baseline capture, prompt injection detection via Warden Gate, and basic audit logging. No credit card required, no time limit.

Pro ($9.99/mo) is for individual developers who want advanced threat detection — full governance pipeline, attack fingerprinting, and tamper-evident audit chain. Business ($49/mo) adds deception layers, adaptive learning xenobots, and supports teams of up to 10 seats.

Yes. The SDK runs entirely in your environment. No data leaves your infrastructure. Enterprise tier includes custom deployment support.

Your opinion means a lot.

Feedback

Sign in to scan

Enter your email to start your free security scan. No password needed.