Merkle Mountain Range audit ledger for tamper-evident logging and cryptographic accountability.
-
Updated
Mar 18, 2026 - Python
Merkle Mountain Range audit ledger for tamper-evident logging and cryptographic accountability.
Runtime security & governance control plane for AI agents. Enforces per-tool authorization, OPA policy, behavioral risk scoring, blast-radius analysis, autonomy contracts, and tenant kill-switch. Every decision is ed25519-signed and Merkle-anchored for tamper-evident audit. 12 microservices, sub-30ms p95, OWASP LLM Top-10 coverage.
The regulator is coming. Your AI models, agents, and API calls deliver sealed, signed, timestamped proofs — court-admissible. EU AI Act · GDPR locked down in one line of code.
The world's first intelligence-agnostic anti-social network.
Sovereign AI OS — WORM-sealed agent decisions, bare metal, source-available (FSL-1.1). Not open source.
Moirai — Sovereign Local Autonomous AI Agent Runtime. Local-first, long-term memory, multi-paradigm forecasting, bounded autonomy, cryptographic audit. Pre-commercial. Proprietary closed-source. NDA-gated evaluation access only. © Arc Studio.
Proof-of-concept demonstrating cryptographically verifiable AI generation refusals. This repository shows how unsafe or illegal generations can be proven to have never occurred, using hash chains, signatures, and auditable evidence packs.
OBSIDIAN — Capital intelligence infrastructure. Adversarial multi-agent deliberation engine with constitutional governance and cryptographic provenance. Built to deliver earned conviction in contested environments. One operator. Absolute precision.
World-first, publicly documented cryptographic audit trail PoC for Interactive Brokers (IBKR) trading workflows. Demonstrates event-level, tamper-evident logging with Merkle proofs, digital signatures, and independent third-party verification using VeritasChain Protocol (VCP) v1.1.
Sovereign AI Infrastructure — SACM Mesh, SEIT Standards, FORGE Token, 11 Agents
An execution kernel that treats LLMs as untrusted compute and enforces policy via deterministic runtime interception.
Add a description, image, and links to the cryptographic-audit topic page so that developers can more easily learn about it.
To associate your repository with the cryptographic-audit topic, visit your repo's landing page and select "manage topics."