Universal Safe Execution

Kazibee is a bounded code execution agent. Build anything—image editors, workflow engines, data processors—expose it as callable functions, and let AI do real work. Only against capabilities you explicitly define.

The problem

Work doesn't happen in a chat window. It doesn't happen in a folder. It happens everywhere. Yet AI is trapped in one interface—no flexibility to meet you where the work actually is.

The solution

A bounded execution layer where AI receives a fixed interface, not general system access. If a function isn't on the approved interface, it isn't callable. Faster execution without losing control.

How it works

Plugin-based execution for AI agents

1

Install any capability as a plugin

Everything in Kazibee is a plugin. Install pre-built tools from GitHub or build your own. Image editing, Gmail automation, Google Sheets, cloud infrastructure—every capability is a plugin you explicitly install and control.

# Install any plugin from GitHub

kazibee install gmail github:kazibee-team/kazibee-tool-gmail

kazibee install image-gen github:user/custom-tool

# Install globally for all projects

kazibee install image-editor github:user/tool --global

Image editing Email automation Spreadsheets Cloud infra Custom APIs
2

Plugins expose typed interfaces

Each plugin defines a TypeScript interface. AI agents discover capabilities through introspection—no guessing, no arbitrary access. View merged interfaces across all tools or inspect individual plugins.

# Discover all installed tools

kazibee list

# View merged interface across all tools

kazibee show

# Inspect a specific tool's interface

kazibee show gmail

3

AI executes JavaScript against fixed interfaces

AI writes JavaScript that calls plugin methods. Execution runs in a controlled environment—only installed plugins are accessible. No dynamic imports, no eval, no arbitrary code execution.

# Find reports on Drive, create draft email with attachments

kazibee exec <<'EOF'

const files = await tools["google-drive"].listFiles("name contains 'Q4 Report'");

const attachments = files.slice(0, 3).map(f => ({

fileId: f.id, filename: f.name

}));

await tools["gmail"].createDraftWithDriveAttachments(

"team@company.com",

"Q4 Reports Ready",

"Hi team, attached are the Q4 reports.",

attachments

);

EOF

Fixed

Interface

Zero

Implicit access

100%

Reviewable

Execution boundary

Sandbox enforcement before runtime

Every code snippet is statically analyzed before execution. Try to escape the sandbox and execution is blocked immediately.

Example: Attempting to use forbidden imports

# Try to import fs module and access Drive

kazibee exec <<'EOF'

import fs from 'fs';

const files = await tools["google-drive"].listFiles();

EOF

❌ AST validation failed:

Line 1:1 — Import declarations are not allowed in sandboxed code

Static analysis

Before every execution

Allowlisted APIs only

Nothing outside your defined interface

Deterministic boundaries

Reviewable, repeatable, controlled

Why Kazibee

Not just another automation tool

Programmable, not prebuilt

Execution via real functions, not rigid templates.

Integration-agnostic

Not tied to one ecosystem. Any API works.

Code-based logic

Supports branching and orchestration, not just triggers.

Bounded security

Security through fixed interfaces. If it's not on the allowlist, it's not callable.

Put AI to work

Connect your APIs, build your first connector, and start executing real workflows today. Kazibee is free and open source.

Kazibee Kazibee

Bounded AI execution. Free and open source.