Technical Evaluation Path
Five steps to validate the architecture, run the implementation, and assess integration fit.
Run the Verifier
Start with the independent evidence verifier at /verify. Zero AGA imports. Standard Ed25519 + SHA-256. If the cryptographic evidence is valid, any implementation will produce the same result.
Open VerifierReview the Architecture
Read the two-process enforcement model, sealed policy artifacts, and continuity chain design on the technology page. Understand the security assumptions and guarantees.
View TechnologyInspect the Reference Implementation
The TypeScript/Node.js reference implementation has 112+ automated tests covering policy sealing, enforcement actions, receipt generation, chain integrity, and evidence verification.
View on GitHubTrace the Walkthrough
Follow a complete governance lifecycle from policy sealing through drift detection, enforcement action, and evidence export. Every step produces signed, verifiable output.
View WalkthroughRequest the Diligence Pack
Patent application, NIST submissions, architecture documentation, and integration assessment materials. Everything needed for institutional technical review.
Contact UsReady to Go Deeper?
Get the full diligence pack with patent application, NIST submissions, architecture documentation, and integration assessment materials.