News

NVIDIA's OpenShell Runtime Sets New Security Bar for Enterprise AI Agents

NVIDIA's OpenShell enforces kernel-level sandboxing on AI agents with a deny-by-default policy model; Cisco, Microsoft Security, and Google are already building compatibility in.

Lauren Xu3 min read
Published
Listen to this article0:00 min
Share this article:
NVIDIA's OpenShell Runtime Sets New Security Bar for Enterprise AI Agents
Source: miro.medium.com
This article contains affiliate links, marked with a blue dot. We may earn a small commission at no extra cost to you.

Every enterprise AI agent today operates under an implicit security assumption: that the model's behavioral instructions are enough to keep it from doing damage. NVIDIA's OpenShell, released as part of the open-source Agent Toolkit at GTC 2026 on March 16, rejects that assumption by creating sandboxed environments where AI agents can operate indefinitely while remaining subject to enforced constraints.

OpenShell is an open-source runtime for executing autonomous AI agents in sandboxed environments with kernel-level isolation. It combines sandbox runtime controls and a declarative YAML policy so teams can run agents without giving them unrestricted access to local files, credentials, and external systems. The enforcement runs out-of-process, meaning the agent cannot override the constraints even if it has been compromised or fed adversarial instructions. Every outbound connection is intercepted by the policy engine, which either allows the connection, routes it for inference while stripping caller credentials, or blocks it. By evaluating every action at the binary, destination, method, and path level, the engine ensures an agent can install a verified skill but cannot execute an unreviewed binary.

NVIDIA is working with Cisco, CrowdStrike, Google, Microsoft Security, and TrendAI to build OpenShell compatibility into their respective security tools. Also inside the toolkit is NVIDIA AI-Q, an agentic search blueprint built with LangChain. Cohesity has moved further still, announcing direct integration with OpenShell where each agent session is isolated, every action is policy-enforced before it executes, and the runtime implements guardrails that cannot be bypassed. The breadth of these partnerships signals something beyond a product launch: governance tooling for agents is becoming a baseline category expectation.

Policy updates happen live as developers grant approvals, with full audit trails. That design choice is deliberate. Autonomous agents mark a new inflection point in AI: systems are no longer limited to generating responses or reasoning through tasks. They can take action, reading files, using tools, writing and running code, and executing workflows across enterprise systems. Per-step human approval doesn't scale when agents are designed to run continuously.

AI-generated illustration
AI-generated illustration

Monday.com's AI agent layer already enables agents to create items, update board fields, and fire automation sequences, which means the platform's security posture is already implicated in these questions. An enterprise buyer evaluating those capabilities this year will ask the same things they now demand of any system-of-action: who authorized this agent's permission scope, what data could it access, and does an immutable record exist of every action it took. In a multi-agent workflow, each agent has its own YAML policy scoped to its specific role, and inter-agent communication is treated as a data routing event subject to the same enforcement rules as agent-to-external-system communication. Engineering teams face a concrete version of this today: what happens when an external agent requests write access to a board item? That question needs a documented, enforceable answer before it gets tested in production.

With OpenShell, enterprises can separate agent behavior, policy definition, and policy enforcement, giving organizations a single, unified policy layer to define and monitor how autonomous systems operate. That architecture maps intuitively onto monday.com's existing permission model, where boards, columns, and workspace scopes are already granularly controlled. Certifying compatibility with a dominant agent runtime, or building demonstrable equivalents into monday.com's own execution environment, is likely to appear in enterprise RFPs before year-end. Sales teams walking into those reviews will need more than a roadmap slide.

Know something we missed? Have a correction or additional information?

Submit a Tip

Never miss a story.
Get Monday.com updates weekly.

The top stories delivered to your inbox.

Free forever · Unsubscribe anytime

Discussion

More Monday.com News