Research - Adaptive Governance Protocols

Governance that fires before the first token.

AGP compiles your SOPs into Lean4 canonical proofs and runs them as a CEDAR-backed validation gate in front of every agent action. Non-compliant paths terminate before generation - not after. Deterministic by construction, model-agnostic, audit-defensible.

Phase 1-2 shipped Phase 3 in flight - external API - Lean4 - CEDAR - 4-tier rule hierarchy
AGENT 1 AGENT 2 AGENT 3 AGENT 4 AGENT 5 AGP LEAN4 For all x. P(x) CEDAR permit iff PROOFS determin. runtime MODEL OUTPUTS PRE-EXECUTION VALIDATION - NON-COMPLIANT PATHS TERMINATE HERE
Pre-execution validation Lean4 canonical proofs CEDAR policy runtime 4-tier rule hierarchy Document auto-extraction Template anonymization Model-agnostic
The problem

Three failure modes, one ceiling.

Every governance technique in production today operates inside the probabilistic substrate of the model. Each lowers the probability of violation; none eliminates it. The ceiling is not a tooling gap - it's a property of probabilistic systems.

The numbers below are drawn from public benchmarks (HarmBench 2024, Lakera technical disclosures) and from production telemetry across guardrail and output-filter deployments.

PROBABILISTIC SUBSTRATE INSTRUCTION-LEVEL ENCODING NO MACHINE-CHECKABLE ARTEFACT No probabilistic system reaches down AGP IS HERE PERSUADABLE prompt-level guardrails REACTIVE post-hoc filtering OPAQUE no decidable proof
Vertex 1 - Persuadable rules

Prompt-level guardrails

System-prompt instructions live inside the same probabilistic context window the model uses to reason. They compete for attention with user messages - and lose. Conversational pressure, multi-turn structuring, and novel phrasings bypass guardrails that the model classifies as "instructions" rather than "constraints."

8-15% jailbreak rate - HarmBench 2024
Vertex 2 - Post-hoc filtering

Output-filter detection

Filters fire after the model has already committed compute and made the decision. Only the surface response is suppressed; the internal violation has already happened, partial outputs may have crossed boundaries, and tool calls may have been issued. Every block is evidence of what the agent attempted, not proof of what it would not have done.

250-450ms median latency before block
Vertex 3 - Probabilistic detection

Classifier-based enforcement

Every detector - prompt-injection, output-filter, conversation-rail - is itself a learned classifier. It catches what its training data prepared it to catch. Cross-language attacks pass; novel formulations pass; semantic edge cases pass. There is no decidable artefact you can show a regulator that says "this rule was provably enforced."

0 machine-checkable proofs in standard stacks

The architectural question follows: can a single design eliminate violation as a possibility, rather than reduce its probability - without leaving the probabilistic substrate?

The architectural gap

Why the field's three governance approaches each plateau

Lakera, Guardrails AI, and NeMo Guardrails each get something right - and each is excellent for the failure mode it was designed to catch. None is positioned to deliver deterministic, pre-execution, audit-defensible enforcement of business rules, because the architecture they share is a learned classifier, not a proof.

Lakera
Pre-call classifier
Strengths
  • Fast pre-call screening (~50ms)
  • Strong on known jailbreak patterns
  • Model-agnostic API
Weaknesses
  • Catches what training data prepared it to catch
  • Confidence scores - not proofs
  • No business-rule semantics (loan thresholds, KYC, aggregates)
  • Cross-language attacks slip past English-trained classifiers
Architectural ceiling

"Is this prompt malicious?" is a probabilistic question. The detector reduces violations; it cannot eliminate them.

Guardrails AI
Post-call schema validator
Strengths
  • Excellent structured-output validation
  • Composable validator framework
  • Open-source, permissive licence
Weaknesses
  • Validates after generation - violation already happened
  • Retry path is itself probabilistic
  • Schema-bounded - weak on semantic policy
  • Cannot express aggregate or context-dependent rules
Architectural ceiling

A schema validator catches malformed output. It cannot catch correctly-formed output that violates policy.

NeMo Guardrails
Conversation rails (Colang)
Strengths
  • Strong on conversational topic management
  • Configurable dialogue flow via Colang DSL
  • Backed by NVIDIA infrastructure
Weaknesses
  • Rail recognition is itself an LLM call - probabilistic
  • Heavy framework integration into agent runtime
  • Limited expressiveness for action-level business rules
  • Rail definitions drift as conversation patterns evolve
Architectural ceiling

Keeping a chatbot from discussing competitors is a different problem from preventing a non-compliant action.

All three are valuable. None is sufficient. AGP does not displace any of them - it sits in the architectural layer they cannot reach: deterministic, pre-execution, business-rule enforcement.

The bet

Leave the probabilistic substrate. Validate against a proof.

"

For any probabilistic system with non-zero violation probability p per request, the probability of at least one violation in N requests is:

P(>= 1 violation in N) = 1 - (1 - p)N
p = 0.001
N = 10,000
P approx 99.995%
p = 0.0001
N = 100,000
P approx 99.995%
AGP - proof valid
N = infinity
P = 0

As N grows, P approaches 1. No probabilistic governance technique escapes this: lower the per-request violation rate by 10x and the probability of at least one violation across a year of enterprise traffic still approaches certainty. The deterministic alternative is the inverse: validate the action against a proof before generation. If the proof holds, the action proceeds. If it does not, the action terminates. P(violation | rule authored, proof valid) = 0 - by construction, not asymptotically.

The honest bound: this only holds for rules that have been authored. AGP enforces what you write into it. Un-thought-of edge cases pass through. Rule completeness remains a human responsibility - but every authored rule is unbreakable. We address the bound directly in Section Limitations.

Benchmarks

What AGP buys you, measured.

Numbers below reflect production observations across pilot deployments. AGP's deterministic claims (zero violation, decidable artefact) follow from the architecture, not from measurement. Latency claims are measured.

Violation probability
0%

For authored rules with a valid Lean4 proof. By construction.note

Pre-execution overhead
~8ms

Median CEDAR validation latency. P95 under 18ms across pilot rule sets.

Audit coverage
100%

Every action carries a Lean4 proof reference and a CEDAR evaluation trace.

Model coupling
Model-agnostic

Works with GPT, Claude, Gemini, Llama, Qwen - any model, on-prem or hosted.

Pre-execution validation latency

Median check time per request

LOWER IS BETTER - ms
0 100 200 300 400 MILLISECONDS AGP CEDAR ~8 ms Lakera CLASSIFIER ~80 ms NeMo Guardrails RAIL - LLM CHECK ~250 ms Guardrails AI SCHEMA - POST-GEN ~350 ms

AGP's CEDAR-based runtime evaluates a typical rule set in single-digit milliseconds; competing techniques add classifier inference (Lakera), conversation-rail recognition (NeMo), or full output regeneration cycles (Guardrails AI on retry). Numbers reflect single-request median across pilot deployments; full methodology and reproducible test harness coming alongside the benchmark report.

Architecture comparison

Eight dimensions, four approaches

Lower-better marked - down
Dimension Lakera Guardrails AI NeMo Guardrails AGP
Validation primitive Classifier Schema validator Rail recogniser (LLM) Mathematical proof
Validation timing Pre-call (prompt) Post-call (output) Mixed Pre-execution (action)
Rule semantics Adversarial patterns Output structure Conversation flow Business rules + aggregates
Median latency down ~80 ms ~350 ms ~250 ms ~8 ms
Audit artefact Confidence score Schema result Rail log Lean4 proof + CEDAR trace
Failure mode Probabilistic miss Probabilistic retry Probabilistic recognition Deterministic block
Cross-language coverage Training-set bound Schema-bound LLM-dependent Language-independent
Compliance evidence None Limited Limited Comprehensive
Methodology - honest accounting

note The "0% violation" claim applies to authored rules with a valid proof. Rules that have not been authored cannot be enforced. AGP makes authored rules unbreakable; rule completeness remains a human responsibility. Latency numbers are single-request medians from pilot deployments; reproducible benchmark harness, full methodology, and the comparison study against Lakera / Guardrails AI / NeMo are being assembled into a public benchmark report. Public timelines: end-Q2 2026.

Architecture

From SOP to enforced proof.

A policy document enters the pipeline once. Rules are extracted, reviewed, structured, and compiled into Lean4 proofs and CEDAR policies. From that point on, every agent action is validated against the compiled policy set - deterministically, in single-digit milliseconds, before generation.

AUTHORING - ONE-TIME RUNTIME - EVERY REQUEST Document SOP - POLICY - REG Extraction NLP + ADMIN REVIEW Hierarchy 4-TIER + STEPS For all x. P(x) LEAN4 permit iff CEDAR Compilation PROOF + RUNTIME POLICY POLICY SET Pre-execution Gate CEDAR EVAL - ~8MS Model ANY LLM down TERMINATE audit log + refusal Authoring stages Runtime - pre-execution gate Downstream (any model) Block branch
Principle 1
Validate before generation
Never produce an output that needs to be filtered. Validate the action; the model never speaks if the action fails.
Principle 2
Author from documents
Rules come from policy documents, not custom code. NLP-driven extraction with mandatory admin review.
Principle 3
Hierarchy, not flat
Geography -> Domain -> Use Case -> Flow. Inheritance, override, and template reuse are first-class.
Principle 4
Proofs, not patterns
Lean4 canonical proof artefact + CEDAR runtime policy. Decidable, machine-checkable, regulator-defensible.
Principle 5
Model-agnostic
Validation runs on the action, not the model's internals. Any LLM, any provider, on-prem or hosted.
The four-tier hierarchy

Rules cascade the way policies actually work.

A flat ruleset doesn't model how organisations think about policy. AGP files every rule into a four-tier structure that mirrors the real-world hierarchy: jurisdiction inherits, domain refines, use case specialises, flow operationalises. Override and reuse become first-class - and templates emerge naturally at the upper tiers.

Tier 1 - Geography
India
+ 14 geographies active
inherits
Tier 2 - Domain / Industry
Banking (BFSI)
+ 6 domains active
refines
Tier 3 - Use Case / Department
Customer Support
+ 4 use cases active
specialises
Tier 4 - Flow
Loan Enquiry Flow
+ 11 flows active

An agent attached to this flow inherits all four tiers' rules - evaluated as a single composed CEDAR policy set at runtime.

Rule cascade - what each tier contributes
From Tier 1 - India

RBI Master Direction caps unsecured loans - KYC documentation per PMLA - customer-protection mandates - DEPA consent flow.

+ Tier 2 - Banking

Aggregate exposure limits - interest-rate disclosure rules - required risk-warning language - escalation matrix for large-ticket products.

+ Tier 3 - Customer Support

Tone constraints - PII handling for chat - auto-escalation triggers - forbidden topics list - in-channel data retention policy.

+ Tier 4 - Loan Enquiry Flow

DTI threshold - pre-approval data set - rate-quote freshness window - required fields before pre-approval emit - approver tier above Rs 50L.

Composed at runtime

Every action the agent takes is evaluated against the composed policy set in a single CEDAR call. Override semantics are explicit; an inner-tier rule that loosens a constraint is recorded as an override, not a silent re-interpretation.

Network effect

Tiers 1 + 2 form system templates reusable across organisations in the same jurisdiction and industry. A new Indian bank onboarding to AGP starts from a curated India + Banking template - they author only their organisation-specific deltas.

Inside the gate

Every action is a query. Every query a proof.

When an agent intends to take an action, AGP renders that action as a CEDAR request and evaluates it against the active policy set - twice. Once before the model is invoked (request validation), once after the model proposes its plan (action validation). Both gates emit decidable artefacts.

AGENT INTENDED ACTION { principal, action, resource, context } JSON CEDAR Policy Evaluation composed policy set - ~8 ms median tier 1 + tier 2 + tier 3 + tier 4 For allx.P(x) proof index : PERMIT FORBID Action proceeds -> model invoked -> proof ref attached Action blocks -> structured refusal -> rule(s) named BOTH PATHS EMIT TO AUDIT LOG EVERY EVALUATION EMITS CEDAR trace Lean4 proof reference Decision provenance
Artefact 1

Lean4 proof reference

For every permit decision, the policies that fired carry their compiled Lean4 proof artefact. The proof is canonical, mechanically checkable, and reproducible. For a regulator asking "how do you know this was compliant?", the answer is the proof.

Artefact 2

CEDAR evaluation trace

The full evaluation trace: which policies were considered, which fired, which abstained, which conflicted. This is what a compliance reviewer reads to understand why the system reached its decision - not a summary, the raw evaluation artefact.

Artefact 3

Decision provenance

Timestamp, agent identity, user identity, request context, policy versions in effect. The audit trail is immutable, append-only, and addressable by request ID. Replay any historical decision against any policy version for audit-trail integrity.

The pairing of pre-generation request validation and post-generation action validation closes the loop. There is no point in the lifecycle at which a non-compliant action reaches the user.

Capabilities

What the admin actually does.

Seven operations cover the full lifecycle of governing an agentic system: extracting rules, editing thresholds, managing dependencies, sharing templates, attaching governance to agents, and propagating it across multi-agent networks. Each is one click - no code path through engineering.

01

Rule toggle

Switch any rule on or off from the admin UI. Toggled-off rules stay in the system as versioned artefacts; reactivation is one click. The difference between a governance layer engineering owns and one compliance owns.

0 code - 1 click
02

Dependency management

Rules depend on rules. AGP tracks dependencies as a graph and warns before destructive changes - every disable surfaces the affected rules so impact is reviewed before commit. No silent breakage.

graph-tracked - pre-warning
03

Real-time editing

Edit thresholds, time windows, currencies, and named entities directly. Changes propagate to every agent in the next CEDAR evaluation. Versioned: replay any historical decision against any rule version.

live - versioned - replayable
04

Document auto-extraction

Upload new SOP versions whenever a policy changes. AGP proposes the deltas - new rules, modified parameters, removed rules - for admin review. Continuous extraction keeps the rule set current.

PDF - DOC - CSV - XLS - TXT
05

Template anonymisation

When rule groups are shared across organisations as templates, organisation-specific identifiers are stripped automatically. Functional logic preserved; proprietary names and entities scrubbed.

privacy-first - cross-org safe
06

Agent Studio integration

Inside Vanij's Agent Studio, a dropdown attaches an AGP template to any agent at design time. The agent inherits the rule set and validates against it at runtime - governance ships with the agent.

1-dropdown - zero-code
07 - network-wide

Multi-Agent Orchestration compatibility

In multi-agent flows, a shared AGP template applies network-wide. Whether the network has two agents or twenty, every agent evaluates against the same composed CEDAR policy set. Without this, multi-agent systems regress to the worst-case behaviour of any single agent. With it, the entire network inherits the governance posture of the template.

shared template - uniform enforcement - no weakest-link
AGP Template composed policy set AGENT CS AGENT UNDER WRITE AGENT COLLECT AGENT KYC UNIFORM ENFORCEMENT - 4 AGENTS - 1 POLICY SET
Templates & network effect

The library compounds. The moat is shape.

Every rule group authored on AGP becomes a candidate template. Templates are the structural mechanism by which the platform's value to the next customer compounds with every previous customer's authoring effort. Anonymisation makes cross-organisation sharing safe.

System-level templates

Geography x Domain

Anchored to a jurisdiction and an industry. Curated by Adya in collaboration with regulatory experts and partner organisations. Encode the rules that apply to every organisation in that segment.

Example template
India + Banking
RBI Master Direction (lending, KYC, customer protection)
PMLA documentation and reporting
DEPA consent + DPDP data handling
Aggregate exposure + sector concentration limits

A new Indian bank attaches this template and starts with regulatory baseline coverage - they author only their organisation-specific deltas.

Use-case templates

Department x Flow

More granular. Anchored to a specific department and operational flow. Authored by the organisations using AGP and shared back, anonymised. Every bank's loan enquiry flow has variants - but they share 70-80% common shape.

Example template
Banking - Customer Support - Loan Enquiry Flow
Required fields before pre-approval emit
DTI threshold + override matrix
Rate-quote freshness + disclosure language
Auto-escalation triggers + tone constraints

A bank refines this over six months in production; they publish the anonymised version. The next bank adopts it as a starting point and customises from there.

Anonymisation
What gets stripped

The functional logic - rule structure, thresholds, dependencies, override semantics - is preserved. The proprietary details - internal product names, system identifiers, named entities, organisation-specific approval roles - are scrubbed at template-publication time. The original organisation retains the unanonymised version; the published template is a sanitised projection.

check Preserved
rule structure
thresholds + parameters
dependency graph
override semantics
step decomposition
x Stripped
org / product names
system identifiers
named entities
internal approval roles
private API endpoints
Network property 1

Coverage

Every new rule group authored expands the template library. Geographies, domains, and use cases that have a few templates today will have many in two years. The library map is a live, growing artefact.

Network property 2

Quality

Templates that are widely adopted accumulate refinement. With a hundred organisations on a template, the bugs and gaps get found and fixed. A template six months from now is sharper than one today.

Network property 3

Speed

A new organisation onboarding today might need three to six months to author a comprehensive rule set from scratch. With templates, the same organisation runs deterministic governance in days, with refinement happening in flight.

The shape of the moat is the same one Linux, GitHub, and Stack Overflow each built: the artefact library matters more than any single artefact.

The honest bound

Where the proof ends, where humans begin.

AGP is a powerful system because it is honest about what it does - and what it does not do. The mathematical floor is real. So is the limit. This section is load-bearing: mis-stating the bound damages every other claim on this page.

Limit 1

AGP enforces only authored rules

The "0% violation" claim is conditional on a rule being authored. A bank that has authored rules about loan thresholds, KYC requirements, and aggregate exposure - but has not authored a rule about a novel cross-product structuring scheme that emerges in 2026 - will not be protected by AGP against that scheme. AGP will faithfully enforce every rule in the system; it will not invent rules that do not exist.

This is not a deficiency of AGP. It is a property of any rule-based system. Fire codes, traffic laws, and accounting standards all share this shape.

Limit 2

Rule completeness is human work

AGP can accelerate rule authoring (the deep research agent ingests a regulatory corpus in hours rather than months), structure it (the four-tier hierarchy is a clear taxonomy), and maintain it (continuous document extraction keeps rules current). It cannot do the work. Compliance teams remain the authors. Legal teams remain the reviewers.

For prospective customers: the value depends on the rule-authoring effort. Thin rule set -> thin protection. Comprehensive authoring -> comprehensive protection.

Limit 3

Probabilistic detection still has a place

For the long tail of scenarios no one has thought of yet, probabilistic detection - output filters, anomaly classifiers, behavioural monitors, human-in-the-loop review - remains the only available technique. AGP does not displace these; it relieves them of routine compliance load so they can focus on novelty. Deterministic for known rules, probabilistic for unknown unknowns.

The pattern is the one used in security architecture: deterministic controls handle the 99% case, detection-based controls handle the long tail.

Limit 4

What AGP doesn't claim

  • AGP does not make AI safe. Safety is a much larger property than rule compliance. AGP is a compliance layer.
  • AGP does not eliminate hallucination. Models still hallucinate. AGP prevents hallucinated actions from executing.
  • AGP does not require a specific model. Validation runs on the action, not on internals. Any LLM, any provider.

AGP is a powerful tool because it is honest about what it does and does not do. The mathematical floor is real for authored rules. Beyond authored rules, the work remains human.

In flight - external API - early access waitlist

Wrap any agent. No platform lock-in.

AGP runs as a Vanij module today. The external API - currently in flight - exposes the same pre-execution gate as a model-agnostic compliance call for agents not built on Adya. SDKs in Python, Node, and Go. Per-call pricing, volume tiers, enterprise SLAs.

validate.py
Pre-execution validation
from agp import AGP

agp = AGP(template="india.banking.cs.loan_enquiry")

# before invoking your model - check the action
decision = await agp.validate(
    principal={"agent_id": "loan-bot-v3"},
    action="approve_pre_qualification",
    resource={"customer_id": "C-91204",
              "loan_amount": 7500000,
              "product": "home_loan"},
    context={"dti_ratio": 0.52,
             "kyc_status": "verified"},
)

if decision.permitted:
    # proceed - proof attached to decision.proof_ref
    response = await model.generate(...)
else:
    # structured refusal - rule(s) named in decision.violations
    return agp.refusal(decision)
audit.py
Retrieve audit artefact
from agp import AGP

agp = AGP(template="india.banking.cs.loan_enquiry")

# for any historical decision - get the full artefact
record = await agp.audit(
    request_id="req_01HXKR5...",
)

# Lean4 proof reference (canonical, machine-checkable)
print(record.proof_ref)
# -> "lean4://india.banking.dti_threshold@v3"

# CEDAR evaluation trace (which policies fired)
print(record.cedar_trace.policies_fired)
# -> ["dti_max_50pct", "kyc_recency_30d", ...]

# decision provenance
print(record.decision) # PERMIT | FORBID
print(record.policy_version) # the rule set in effect
print(record.timestamp) # RFC 3339
Hosted or on-prem

Adya-managed endpoint, on-prem deployment, or air-gapped install for regulated workloads. Same SDK shape across all three.

Single-digit ms p50

CEDAR runtime keeps validation overhead in the single-digit milliseconds at p50, sub-20ms at p95 across pilot rule sets.

Python - Node - Go

First-class SDKs in three languages. REST and gRPC interfaces for everything else. Per-call and volume-tier pricing.

Roadmap

Where AGP is, and where it's heading.

The core engine is shipped and in production. The external API is in flight. The learning-governance and open-protocol phases are mapped. Status is current as of May 2026 - and is updated as phases land.

Phase 1
Core engine
shipped

The deterministic floor. Document upload & processing, NLP rule extraction, four-tier hierarchy, rule toggle, real-time editing, Lean4 proof generation, CEDAR runtime, pre-execution validation gate, Agent Studio integration.

Document ingestion NLP rule extraction 4-tier hierarchy Lean4 proofs CEDAR runtime Pre-execution gate
Phase 2
Advanced governance
shipped

Operational scale. Dependency management with impact warnings, template anonymisation, cross-organisation template sharing, Multi-Agent Orchestration template propagation, advanced search and filter in the template browser.

Dependency graph Template anonymisation Cross-org sharing Network-wide enforcement Template browser
Phase 3
External API
in flight

AGP exposed as a model-agnostic compliance API for agents not built on Vanij. Per-call pricing, volume tiers, SDKs in Python, Node, and Go. Enterprise contracts with SLA guarantees. The strategic decoupling: AGP becomes the deterministic layer for any agentic system, regardless of underlying platform.

Hosted endpoint On-prem & air-gapped Python - Node - Go SDKs Volume tiers Enterprise SLAs
Phase 4
Learning governance
future

From a static rule engine to a learning system. Performance analytics, automatic rule refinement from outcome data, predictive rule suggestions for new organisations based on comparable patterns, dynamic rule confidence scores, anomaly alerts for dead or broken rules.

The infrastructure for this - rule firing logs, outcome tracking, decision provenance - is being captured from Phase 1 onward. The data is already accumulating.

Phase 5
Open protocol
future

The AGP protocol specification and reference implementation released as an open standard. The intent: establish AGP as the deterministic governance layer of the agentic AI stack - the way HTTP, OAuth, and OpenTelemetry became standards for their respective layers.

Open protocol does not displace the commercial offering. The pattern is the one used by NVIDIA with CUDA and the Linux Foundation with the kernel: free protocol, commercial implementation, network effect.

Resources

Read the work, check the foundations.

The full paper, the citations the architecture stands on, and the comparison cohort it positions against. Reproducible benchmark harness ships alongside the public benchmark report (end-Q2 2026).

Primary work

AGP - Pre-Execution Mathematical Compliance for Agentic AI

The full whitepaper. 11 sections covering the architectural premise, the mathematical floor, the four-tier hierarchy, the Lean4 + CEDAR pipeline, the empirical comparison, the honest bound, and the production use cases.

Get the paper
Foundations

What AGP stands on

  • [1]Avanesov et al. - Cedar: A New Language for Expressive, Fast, Safe, and Analyzable Authorization. OOPSLA 2024.
  • [2]de Moura & Ullrich - The Lean 4 Theorem Prover and Programming Language. CADE-28, 2021.
  • [3]Anthropic - Constitutional AI: Harmlessness from AI Feedback. arXiv:2212.08073.
  • [4]Greenblatt et al. - AI Control: Improving Safety Despite Intentional Subversion. arXiv:2312.06942.
Comparison cohort

What we benchmark against

  • [5]NVIDIA - NeMo Guardrails: A Toolkit for Controllable and Safe LLM Applications.
  • [6]Guardrails AI - Guardrails: An Open-Source Python Package for Specifying Structure and Type, Validating, and Correcting LLM Outputs.
  • [7]Lakera AI - Real-Time Security for Large Language Model Applications. Technical brief.
  • [8]Mazeika et al. - HarmBench: A Standardized Evaluation Framework for Automated Red Teaming. 2024.
The shift

From persuadable guardrails to provable compliance.

AGP is shipped today. The core engine, four-tier hierarchy, Lean4 proofs, CEDAR runtime, and pre-execution gate are live. The external API is in flight. If you are deploying agents in regulated workflows, the layer that makes "probably compliant" into "provably compliant" is available now.

AGENTS AGP LEAN4 CEDAR PROOFS MODEL OUTPUTS PRE-EXECUTION VALIDATION - DETERMINISTIC - MODEL-AGNOSTIC