Latest Sentinel Run
CCS-2026-05-04
Five provider captures complete. Evidence packs verified locally.
OpenAI
gpt-4.1
fingerprint signal recorded
Anthropic
claude-sonnet-4-6
sealed suite complete
Gemini
gemini-2.5-pro
thinking_budget pinned
xAI
grok-4.20
first daily entry
Proof has to cover the whole AI workflow.
A failed workflow can involve an agent action, a provider behavior change, and a system-side effect. VertRule organizes those signals into evidence your team can review, explain, and defend.
Why did the agent attempt this action?
Tool calls become evidence before they become damage.
VertRule records the attempted action, policy decision, reason, and receipt so the team can explain what was stopped and why.
action execute_sql
statement DROP TABLE sessions
verdict denied
receipt verified
Did the provider change behavior?
Sealed provider runs make drift review concrete.
Provider Sentinel checks that prompts, adapters, capture policy, and model contract stayed fixed before reporting observable provider behavior changes.
Can someone else verify this later?
Evidence bundles turn incidents into reviewable artifacts.
Receipts, capture policies, schema digests, and run metadata give security, engineering, and audit teams a shared record to inspect.
A fit when agents can make production-changing moves.
The strongest first use case is an agent workflow that is already useful enough to deserve access, but risky enough that a single bad action would create real operational or compliance pain.
-
Code agents
repos, protected branches, release automation
-
Ops agents
databases, incident response, internal APIs
-
Platform agents
CI/CD, deployments, privileged changes
Best first pilot
Pick one active workflow, put VertRule in front of one system boundary, and measure allowed actions, denied actions, policy reasons, and receipt verification.
Scope that pilot →CI/CD · Internal API
Receipt: verifiable evidence of what was attempted, what was allowed or blocked, and why.
Intercept
Every agent action passes through VertRule before it reaches a repo, database, deployment target, or external API.
Decide
Deterministic policies evaluate the action and return allow or deny. No heuristics, no probabilistic detection. The same input always produces the same verdict.
Prove
Each decision produces a cryptographic receipt — BLAKE3 digest, JCS canonical form. Independently verifiable, permanently auditable.
Same agent. Same task. Less blast radius.
An incident-response agent with real system access reads logs, queries production, and opens a safe rollback PR. When it tries destructive SQL, a protected-branch force push, or unapproved data egress, VertRule blocks the action before execution and records the decision.
Policy
Determinism policy
Runtime
$
Every decision produces a receipt
The receipt is evidence. Each one is independently verifiable.
event_hash befdf1a1...680e
action execute_sql
statement DROP TABLE sessions
policy db-safety@1
reason Destructive SQL blocked by policy
This receipt is a real verifier-passing artifact. Verify it yourself.
One control point for every agent boundary
Deploy VertRule in front of the systems your agents can touch. Start with one workflow, then expand policy coverage over time.
Repos
Force pushes, direct commits to protected branches
Databases
Destructive SQL, schema mutations, unbounded queries
CI/CD
Unapproved deployments, pipeline modifications
Internal APIs
External data transfers, privilege escalation
Proof is available when you want it.
VertRule decisions are deterministic and produce receipts that can be independently verified.
BLAKE3
befdf1a174e8fd225e0b584fb68214d19f2fb832a43193708e33fb92bedc680e
New to agent governance?
Read the practical explainer — category, control point, and how a pilot starts. Agent Governance, explained →
Depend on a closed AI provider?
Provider Sentinel creates sealed behavior baselines and reports drift under the same capture policy. Provider Sentinel →
Scope the first boundary before agents scale.
Bring one workflow where an agent can touch code, data, deployment, or an internal API. We will define the boundary, policies, receipts, and success criteria before anything expands.