Technical Documentation · v1-enforced-irreversible
Governance Execution Interface
The enforcement kernel. No token, no execution.
Overview
The GEI is a cryptographic enforcement primitive. It sits between policy decision and tool execution. Before any agent action runs, the GEI evaluates the request against the governing policy, signs a token binding the decision to the exact parameters, and logs the decision to a tamper-evident ledger. If any step fails, execution does not proceed.
The kernel is deterministic. Given identical inputs — same request, same policy, same timestamp — it produces byte-identical decisions, tokens, and ledger entries. This is not a design preference. It is a requirement for forensic replay.
Architecture
The GEI separates into two principals with asymmetric authority:
GEI Issuer
The authority. Holds the signing key. Evaluates policy. Signs governance tokens. Cannot execute tools.
Broker (Verifier)
Holds public keys only. Cannot sign. Cannot issue. Validates tokens before permitting execution. Can be deployed independently — in a different process, on a different machine, in a different cloud.
This separation is structural. The signing key never leaves the trust boundary. The broker can run anywhere the fleet runs.
Execution Model
1. Agent requests tool execution
2. GEI evaluates request against active policy bundle
3. Decision logged to tamper-evident ledger (before execution)
4. If allowed: GEI signs token binding decision to parameters
5. Agent presents token to broker
6. Broker validates the token cryptographically
7. If valid: tool executes
8. If any step fails: execution does not proceed. No fallback.
HARD INVARIANT:Decision before execution. If the ledger write fails, the tool does not run.
Key Properties
Cryptographic parameter binding.
The token is bound to the exact parameters via cryptographic hash. Modifying parameters after authorization invalidates the token.
Replay prevention.
Each token includes a one-time-use nonce. Replaying a valid token is denied.
Tamper-evident audit chain.
The decision ledger is append-only and hash-chained. Any modification — deletion, insertion, reordering — is detectable.
Scope isolation.
A token for one tool cannot authorize a different tool. A token for one tenant cannot authorize a different tenant.
Fail-closed.
Unknown key, malformed payload, unavailable nonce store, ledger write failure — all result in deny. No exceptions.
Deterministic replay.
Given a trace identifier, the complete governed action can be forensically reconstructed and its cryptographic integrity verified.
Policy version binding.
Every token references the specific policy version that authorized the action. The full decision provenance is preserved.
Frozen State
The kernel is frozen at v1-enforced-irreversible. This means:
- No new features are added to the kernel.
- No existing invariants are relaxed.
- The token structure and serialization format are locked.
- The trusted computing base is minimal and closed.
Policy evaluation, the DSL, integration adapters, and tooling are built around the kernel — not inside it.
Validated Environments
The GEI kernel has been validated with full test coverage across token signing and verification, replay prevention, ledger integrity, forensic reconstruction, adversarial inputs, and end-to-end governed execution — both locally and inside Azure Confidential Compute (AMD SEV-SNP) with vTPM attestation.
Full Technical Specification
The complete GEI specification — including token structure, serialization rules, verification sequence, ledger schema, and invariant definitions — is available to qualified partners and investors.
Request Technical Access →AmplefAI · Because the system being governed cannot govern itself.