Security
Prevent AI agents from running unsafe operations and capture denied intents for investigation.
Full capability map
A comprehensive list of what EctoLedger offers across security enforcement, audit evidence, governance, SDKs, deployment, and architecture.
Who this is for
What EctoLedger is not
Use Cases by Team
Prevent AI agents from running unsafe operations and capture denied intents for investigation.
Generate tamper-evident records and certificates for policy reviews, audits, and due diligence.
Operate agent workflows with enforceable controls, approval gates, and replayable execution history.
Verify what the agent attempted versus what actually executed using independent validation tools.
Platform Matrix
Core control and evidence features are cross-platform. Isolation and system integrations vary by OS.
| Capability | macOS (Apple Silicon) | Linux | Windows |
|---|---|---|---|
| CLI + desktop GUI | Yes | Yes | Yes |
| 4-layer pre-execution checks | Yes | Yes | Yes |
| Hash-chained + signed audit ledger | Yes | Yes | Yes |
| `.elc` certificate export + offline verification | Yes | Yes | Yes |
| OS sandbox integration | Seatbelt | Landlock + seccomp | Job Objects |
| Hardware isolation path | Apple Hypervisor guard (feature-gated) | Firecracker microVM (feature-gated) | Not available |
| Platform key storage integration | macOS Keychain (optional feature) | Secret Service (optional feature) | Credential Manager (optional feature) |
Core Security and Enforcement
Enterprise Compliance and Auditing
Developer SDKs and Integrations
Operations and Runtime Controls
Under-the-Hood Architecture
Next step
Start with Quick Start for a local run, then verify audit evidence with exported certificates and policy-driven replay.