Not self-aware, just more aware. We block the door, not the person.
Intelligent Dog™ isn’t a single daemon. It’s a multi-avatar system: Detective (container), Enforcer (host/agent), Commander (website brain), and Electrician (network). It turns operations from human-ruled to rule-of-law to preserve security, stability, fairness, and compliance.
Shell hook + process polling; track UID/PID/GPU/CPU/Mem; real-time anomaly reports.
Pull the plug, ban, destroy/recover dirty containers; business keeps flowing.
Policy, queue, fairness timers, alerts. Someone always takes the ticket.
Gate 1 issues access_token + cookie; Gate 2 pre-VNC cookie match; mismatch = 401.
GPU power cap / CPU cores / Max RAM — no abuse, no “stolen cores”.
UID/PID/Shell + timestamps packaged on host desktop.
Dual-gate + patrol + hard-limits.
Isolate violations; queue & business don’t stop.
Native queue, countdown, expiry cleanup; no ghost machines.
Evidence chain complete; “Dog kicks, humans follow”.
Decoupled avatars; rolling upgrades under control.
The website cleans up expired data, schedules startups, queues, corrects data errors, rejects "ghost machines," issues offline alerts, and covers human errors; it also dispatches machines for shutdown. Agent: Covers heartbeat, destruction, and backstopping. Container: Intelligently analyzes illegal operations.