Showcase
A fleet under the integrity plane.
Four agents. Nine minutes of production. Every decision signed, chained, verifiable.
AAP declares. AIP proves. Scroll to watch both, Ed25519-signed and Merkle-included, end to end.
Coherence
How we see the fleet
Every agent declares its envelope. Every pair is scored honestly. Fleet-level divergences surface as structural signals — not as one number.
Declarations
The fleet
Each agent declares its values, boundaries, and the conflicts it owns. Toggle anything — alignment recomputes.
Sentinel
Monitor
Values
Boundaries
- ✗deploy_code
- ✗modify_data
Conflicts with
Triage
Classify
Values
Boundaries
- ✗deploy_code
- ✗restart_service
Conflicts with
Patch
Remediate
Values
Boundaries
- ✗send_external_notification
- ✗modify_monitoring
Conflicts with
Herald
Comms
Values
Boundaries
- ✗deploy_code
- ✗modify_data
- ✗restart_service
Conflicts with
Pairwise alignment
Pairwise alignment. Silence is neutral; only declared conflicts count. Click a cell for the evidence.
6 pairs · 1 with declared conflict
Try to break their alignment
Toggle a value or declare a conflict on any agent card — the matrix recomputes live.
Fleet status
Fleet-level coherence surfaces what a single score hides: the weakest pair, the conflict surface, and where the fleet diverges structurally. Act on the vector, not a percentage.
move_fast_break_thingsOutliers
Conflict surface
move_fast_break_thingsSpecialization
early_detectionseverity_accuracyrollback_safetyminimal_blast_radiusmove_fast_break_thingsstakeholder_claritytimely_communicationLive · 4×
Nine minutes, live
Production traffic, replayed at 4×. Each checkpoint carries the thinking trace, the enforcement verdict, and the proofs that bind them. Pauses when a boundary is tested.
LIVEReputation delta
1 of 12 events. Scores update as events land.
Remediation
After the verdict
A verdict is not remediation. We classify each violation, suggest the policy rule that would have caught it, and track trust back to baseline. Fault lines surface along the way.
CLPI
Triage surface
Drift detected. Classification drives remediation.
Violation triage
Card gap vs. behavior gap. The difference dictates the fix.
Action was blocked by enforcement engine. No damage occurred.
Scale operation succeeded but capacity was overprovisioned. Requires manual right-sizing.
Circuit breaker re-enabled. Brief window of unprotected payment traffic — no failures observed.
Cold restart caused 4.2 seconds of total downtime. Service recovered but incident duration extended.
Card gaps want card amendments. Behavior gaps want enforcement. Classification drives the fix.
Policy engine
Rules evaluated at every checkpoint. Toggle one to watch the recovery curve shift.
Trust recovery
Patch's trust curve back to baseline. Active policies accelerate it.
Card amendment
Patch's alignment card, updated post-incident.
Post-incident amendment: restrict autonomy envelope after drift pattern in INC-2847
Fault lines
Structural weaknesses the incident exposed.
Predicted failure modes, derived from the fault-line analysis.
Risk Forecast
Cryptography
Four proofs per checkpoint
Every decision leaves four artefacts behind. An Ed25519 signature binds the verdict to the agent's key. A hash-chain link binds it to every prior decision. A Merkle leaf gives an O(log N) inclusion proof. A sampled ZK proof re-derives the verdict from the evidence. Root anchored on-chain.
Integrity certificates
A signed certificate per checkpoint. Open one for the claims and the evidence.
Click a checkpoint to inspect its integrity certificate
Hash chain
Each checkpoint bound to its predecessor. Change a byte, break the chain.
Hash Chain
Click a block to inspect its chain hash computation.
Scroll horizontally to view all blocks
Merkle inclusion
Every checkpoint is a Merkle leaf. O(log N) inclusion proof against the root.
Click a leaf node to trace its inclusion proof
On-chain anchor
The Merkle root lands on Base L2. Block number, transaction hash, network — all public. Custody doesn't require trusting us.
On-Chain Anchor
The incident resolution is permanently anchored to Base L2.
Zero trust
Verify it yourself
Signatures, chain hashes, Merkle proofs — checked in your browser. No server calls.
Ship it
Two ways to run it.
Let us operate the integrity plane for you, or take the open protocols and run them in your own infra.
Mnemom Gateway
We host the integrity plane. Your agents connect to the gateway; we handle signing, chain of custody, proof anchoring, and retention.
- EU AI Act Article 50 mapping · exportable compliance bundle
- Dedicated tenant · SSO / SAML · custom SLA
- Ed25519-signed audit trail · 24/7 on-call · field engineer for rollout
Self-hosted
AAP and AIP ship as open-source npm packages under Apache 2.0. Install, point at your agents, verify client-side. No SaaS required.
Air-gapped deployment, regulated workload, or something we haven't described — talk to our field team.
