Tamper-evident capture layer
Signed, chain-hashed token-level capture across providers and frameworks — the foundation everything else folds over.
The eight capability pillars
Every pillar is built on the same per-tenant TokenAuditEvent ledger — signed by the producer, chain-hashed by the server, anchored daily with a Merkle root. Pillars compose; they don’t fragment.
Pillar 1 is shipped today. The rest are in plan, not shipped — each ships with its own narrative page on this site, its docs page, and a video walkthrough.
Signed, chain-hashed token-level capture across providers and frameworks — the foundation everything else folds over.
Which retrieved chunk shaped which output token. Which system-prompt instruction drove which behavior.
Prompt-injection reconstruction, jailbreak replay, exfiltration detection. The MITRE ATT&CK equivalent for LLM attacks.
Token-level cost attribution by feature, user, agent, team, prompt template. Find the leaks aggregate dashboards miss.
PII/PHI provenance, GDPR right-to-be-forgotten, SOC 2 / HIPAA / FedRAMP / EU AI Act evidence trails. Admissible, not just informative.
Multi-agent token flow visualization, tool-selection investigation, time-travel replay of failed runs.
Hallucination root cause at token level, model version diffing, regression analysis across model updates.
Case management, hypothesis tracking, collaborative investigation, evidence export. Built for analysts, not for ops teams.