Security Operations
Block unsafe agent commands before they hit infrastructure, APIs, or sensitive files.
EctoLedger is a dashcam and emergency brake for AI agents: a security proxy that can block rogue commands before execution, then generate cryptographically verifiable evidence of what happened.
Built for teams running AI in high-risk workflows: security, compliance, platform engineering, and enterprise operations.
Use Cases
Block unsafe agent commands before they hit infrastructure, APIs, or sensitive files.
Produce tamper-evident evidence trails for internal and external audit requirements.
Show customers exactly what the agent attempted, what was blocked, and what actually executed.
Replay AI-assisted workflows with signed, hash-chained records for post-incident analysis.
Clarity first
EctoLedger is not a crypto trading product. Here, "ledger" means a tamper-evident audit log for AI agent behavior.
Flowchart
Every proposed action is checked before execution. Denied actions are blocked and recorded. Allowed actions execute and are sealed into cryptographic evidence.
See it in action
Start with a task, watch the guardrails evaluate each action, and finish with a verifiable certificate proving what happened.
Who is this for?
EU AI Act timelines are approaching. EctoLedger gives you auditable evidence for high-risk AI workflows now.
If your agents run commands and APIs, you need a provable trail showing every decision and action.
Every action passes four validation layers before execution. Rejections are logged and reviewable.
Export `.elc` certificates and verify them offline with a standalone binary. No vendor trust required.
The Solution
Core Ledger
Capture every model decision, tool action, and operator approval in a timeline you can replay and verify.
4-layer semantic guard
Policy engine -> dual-LLM guard -> strict schema validation -> Tripwire. If a proposed action is unsafe, it is blocked before execution.
.elc audit certificates
Export a self-contained certificate with cryptographic proofs and verify it offline using the standalone verify-cert binary.
Legal admissibility depends on jurisdiction and process; EctoLedger provides cryptographic evidence to support review and testimony.
Policy Studio
Metrics
Active Audit
Philosophy
The Rust process is a transient worker. All durable state — event log and snapshots — lives in the configured backend (PostgreSQL or SQLite). The binary has no long-term memory; it restores state from the ledger on each run.
Proposed actions from the LLM are never trusted directly. Policy engine, guard process, then Tripwire validate every intent before commit. Intents that pass are appended to the hash-chained ledger and executed; nothing is ever updated or deleted.
Industry policy packs
SOC 2 Type II, PCI-DSS v4.0, OWASP Top 10 2021, ISO 42001:2023 (AI management). Load via --policy crates/host/policies/soc2-audit.toml and similar.
How It Works
The workflow follows a deterministic progression designed for high-assurance environments.
Step 1
Create a scoped session with explicit mission and policy boundary.
Step 2
Append model and tool events while guardrails validate each operation.
Step 3
Seal the session and export verifiable certificate artifacts.
Execution health
How-To
GUARD_REQUIRED=true.audit \"<goal>\", then export and verify .elc..elc certificate.verify-cert.Need help with setup or verification errors? See the Troubleshooting guide.
v0.6.3 release
Highlights from v0.6. Full README and CLI reference live on GitHub.
DATABASE_URL; LedgerBackend trait for custom stores.did:key: anchored.run_command (Linux).anchor-session --chain ethereum.verify-cert binary.Developers
Zero-friction setup: launcher scripts for macOS/Linux/Windows, Docker demo, or SQLite for local dev. Full docs on GitHub.
Clone, run launcher — backend + Tauri GUI. Or ./ectoledger-mac --demo for zero-config demo with embedded Postgres.
./ectoledger-mac./ectoledger-linux.\ectoledger-win.ps1docker compose -f docker-compose.demo.yml upServe dashboard, run audits, export reports and certificates.
serve — Observer dashboard (default http://localhost:3000)audit "<goal>" — Run cognitive loop with policy/guardreport <session_id> --format certificate --output audit.elcverify-certificate audit.elc — Offline .elc verificationorchestrate "<goal>" — Recon → Analysis → Verifyanchor-session <id> — Bitcoin OTS or EVM anchoringred-team --target-session <id> — Adversarial testingprove-audit <id> — SP1 ZK proof (build with --features zk)pip install ectoledger-sdk · Optional: [langchain] or [autogen]. sdk/python
import asyncio; from ectoledger_sdk import LedgerClient; async def main(): async with LedgerClient("http://localhost:3000") as client: session = await client.create_session(goal="Audit Cargo dependencies"); await client.seal_session(session.session_id); asyncio.run(main())
npm install ectoledger-sdk · Zero deps, native fetch. sdk/typescript
import { EctoLedgerClient } from "ectoledger-sdk";
const client = new EctoLedgerClient({ baseUrl: "http://localhost:3000" });
const session = await client.createSession("Summarise quarterly report");
await client.appendEvent(session.id, { step: "retrieved_docs", count: 42 });
await client.sealSession(session.id);
const cert = await client.exportCertificate(session.id);
Audit certificates (.elc)
Every completed session can be exported as a self-contained .elc verifiable offline. Optional sixth: SP1 ZK validity proof. The verify-cert binary is static and dependency-free for auditors.
Tamper-resistance; payload signed with session keypair; no trusted third party.
Gap and mutation detection; any insertion or change is detectable offline.
Efficient finding spot-checks; O(log n) verification per finding.
Temporal non-repudiation; proves completion before block N.
Session integrity; goal cannot be redirected mid-session.