Initializing AGTS Clearinghouse…
Use these to call the Protocol Worker from your own code. Keep your API key private.
Your credentials are generated when you start a session. The Tenant ID identifies your account; the API Key authenticates every request; the Protocol Endpoint is the URL your backend calls; the Node ID is your unique cryptographic identity on the governance network.
This fires a real governance request from your account. Fill in the parameters for your AI decision and submit — the Protocol Worker will gate, sign, and log the event to your transparency log.
Every field maps to a real protocol parameter. The three observables (H, C, E) are evaluated against gates G1 Semantic Validity, G2 Financial Validity, G3 Operational Validity. Gate G4 Policy Admission checks evidence integrity via artifact hashes. Gate G5 Cryptographic Finalization commits the decision to the append-only Merkle log. If all five gates pass, the decision is admitted and a cryptographic proof is issued. If any gate fails, the decision is refused.
Call the Protocol Worker directly from your AI system's backend. Replace the placeholder values with your credentials from above.
Each Vertical App is a governance engine built for a specific industry domain — cybersecurity, financial risk, autonomous compliance. Instead of generic checkbox audits, each app collects real operational evidence from your systems and submits it for cryptographic validation. If the evidence passes all gates, the system issues an immutable, independently verifiable governance certificate. No evidence, no certificate — there is no way to produce a cert without passing the gate pipeline.
Certs are issued on live telemetry only; synthetic simulation runs never produce certificates.
Log Query API.
GET /agts/v1/log/cert/:leafHash
GET /agts/v1/log/inclusion/:leafHash
GET /agts/v1/tenant/:id/stats
GET /agts/v1/tenant/:id/certs
GET /agts/v1/tenant/:id/timeline?days=N
The Clearinghouse is the central orchestrator of the AGTS protocol. It runs all four governance engines in parallel — Semantic Validity, Financial Validity, Operational Validity, and Gateway Shield — against a single governance request. Each engine independently scores the request on the three AGTS observables: H (Entropy — decision uncertainty), C (Coherence — reasoning alignment), and E (Energy — computational cost). The Clearinghouse aggregates these into a unified verdict and a composite trust score φ (phi). If the aggregate passes all gate thresholds, a signed AGTS_GOVERNANCE_ENVELOPE_V1 is recorded in the transparency log.
All ECDH P-384 and ECDSA keys registered across Sovereign Mail, Drive, and VPN Governance. Keys are anchored in the transparency log at registration.
Look up any user's public key from the key registry by email. Verify fingerprints and transparency log anchoring.
Verified contacts shared across Mail, Drive, and VPN. Saved after key lookup verification.
Monitors the key registry for conflicts — multiple active keys registered to the same identity and key type. Conflicts may indicate key compromise or registration errors.
Walk through the full governance ceremony step by step: evaluate admission gates, assemble a cryptographic proof bundle, run the validator quorum, sign with Sovereign Authority, submit to the transparency log, and close the loop with execution-time variance. Each step unlocks the next — the pipeline prevents skipping ahead.
Open sovereign-authority.html on the ObligationSign operator Pixel (GrapheneOS, Titan M2) · go to Sign Envelope ·
scan this QR code or paste the JSON · tap Sign with Biometric to authenticate and produce the hardware-backed authority_signature · switch to tab ② here to paste the result.
Paste either just the authority_signature string, or the full Stage 2 envelope JSON output by the Pixel app — both are accepted.
This signature is hardware-backed (Titan M2 StrongBox, ECDSA P-256) and biometric-gated — it constitutes the Sovereign Authority record for this governance event.
After attaching, use Submit to Log above to complete the chain.
Shows your tenant's recent leaves from the transparency log. Click Verify → next to any leaf hash to open the verification page with that hash pre-filled.
Complete steps 1 → 2 → 3 in order. Each button becomes active only after the previous step succeeds.
executionRoot (Merkle root over leaf hashes + rate card hash) — the
cryptographic basis of the obligation. A deterministic idempotency_key
prevents duplicate billing on retry.
| Artifact Type | Unit Price (¢) |
|---|
AGTS_SETTLEMENT_V1 receipt tied to the parent bundle hash —
ready to be signed and submitted.
AGTS_SETTLEMENT_V1 receipt to the billing gateway
via the Protocol Worker. The Idempotency-Key header ensures safe retries.
Audit everything the governance pipeline produced. The Compliance Report evaluates each claim (C1–C6) against the selected regulatory framework and lets you countersign and export. The Forensic View traces the full triple-leaf chain, verifies evidence hashes, and projects the HCE feedback nudge for the next session.
Per-claim status for C1–C6 against the selected regulatory framework. Each claim maps to a specific gate (G1–G5) or the closed-loop variance check, and expands to show paragraph-level citations, obligations, and technical satisfaction evidence.
Safety invariants mapped to the AGTS gate architecture (G1–G5 + BFT).
Endpoint availability for the verification chain. Use the Verify or Replay page for cryptographic proof checks.
If uncertain → BLOCK. The system never fails open.
Live Signed Tree Head from the Log Worker — Merkle root, tree size, signatures.
Live decisions flowing through the AGTSBus event fabric this session.
Shadow → Enforced deployment in two phases.
Canonical proof trace for forensic verification. The AGTSReplay engine records every bus event for full deterministic replay.
Test semantic attacks against your current thresholds. All simulations are dry-run — no data is written to the transparency log.