Cybersecurity requires seeing what user-space cannot. When malware spawns from a different user account, manipulates system files, rewrites its own binary, or attempts network connections you did not authorize, those events happen below the user-space boundary. A user-space-only agent sees partial data, or misses entire categories of attack.
We made a deliberate trade: root-level observation for kernel visibility, paired with strict privilege separation so that root visibility never becomes root decision authority. The sensor observes. The user-space AI decides. A compromised sensor without valid HMAC keys cannot issue its own enforcement commands, because the verification step is fail-closed: no HMAC module, no valid signature, no execution.
This is the answer to the question "what stops a malicious user or compromised program on one account from attacking another?" The sensor sees both at the kernel level. It observes the process trying to escalate, the file being written to a protected path, the outbound connection to a command-and-control server. Guardian decides what to do. The sensor carries out the verified command.
Process connector
Every fork, exec, exit on the machine, across every user account. If a process spawns a child that it should not, the sensor sees it.
Fanotify
File events across the filesystem. Creation, modification, deletion of suspicious files anywhere the sensor is watching, not just the current user's home directory.
Audit netlink
Security-relevant system calls with full context. Authentication failures, privilege escalations, syscall patterns that match known attack behaviors.
Network state
Outbound connections, DNS queries, port openings. When malware tries to reach a command-and-control server, the sensor has visibility before the packet leaves the machine.