Graph-native evidence
Each step, approval, tool call, and artifact is a node/edge with a stable content hash for fast queries and diffs.
Hash-addressed Replay-ready Diff-ableBuild agents you can trust. Every action becomes a signed, queryable node in your MCP graph—policies enforced up front, approvals captured in-flight, and evidence hashed for audit.
A content-addressed MCP graph turns plans, approvals, tool calls, and artifacts into verifiable evidence.
Each step, approval, tool call, and artifact is a node/edge with a stable content hash for fast queries and diffs.
Hash-addressed Replay-ready Diff-ableDeclarative policies prevent execution until conditions are satisfied (cost caps, SoD, environment access, PII boundaries).
Deny-by-default Human-in-the-loopTool contracts, RBAC scopes, and signed reviews ship with each workflow. Credentials are scoped per tool and environment.
RBAC Tool contracts Signed reviewsExport provenance for audit or replay in NDJSON/JSON-LD with signatures (e.g., Ed25519) and immutable retention windows.
NDJSON JSON-LDPolicies up front. Approvals at the edge. Evidence everywhere.
policies:
cost_caps:
when: plan.total_cost_usd > 50
require: approval(role="finance")
env_access:
when: step.env in ["staging","prod"]
require: approval(role="security") and mfa(actor)
pii_tools:
when: tool.category == "PII"
deny_unless: data_masking.enabled and rbac.scope includes "pii:read"
# 0) Inspect API
curl -s https://api.distributed.systems/v1/info
# 1) Propose a plan (no side effects)
curl -sX POST https://api.distributed.systems/v1/plans \
-H "Content-Type: application/json" \
-d '{
"goal": "Rotate production credentials",
"constraints": ["require_approval:security","env:prod","cost_usd<=50"]
}'
# 2) Approve if policy requires
curl -sX POST https://api.distributed.systems/v1/approvals \
-H "Content-Type: application/json" \
-d '{"plan_id":"pln_123","actor":"alice@company.com","note":"Change window OK"}'
# 3) Execute (contracts enforced)
curl -sX POST https://api.distributed.systems/v1/runs \
-H "Content-Type: application/json" \
-d '{"plan_id":"pln_123"}'
# 4) Evidence: query a subgraph
curl -s "https://api.distributed.systems/v1/evidence?run_id=run_456&format=ndjson"
Custom MCP clusters built for Jina.ai (Elastic) and Parallel.ai. Bundle graph queries, cost auditors, policy checkpoints, and provenance exports so you can ship mission-critical workflows fast.
Built for Jina.ai (acquired by Elastic). Low-latency planning + verification for finance, ops, and incident response where proofs and guardrails matter.
Optimized for Jina.ai's neural search infrastructure — spend approvals, on-call runbooks, post-incident attestations.
Built for Parallel.ai (Parallel Web Systems). Compliance-first pipelines with rich tooling for KYC/KYB, policy rollout, and auditable oversight.
Optimized for Parallel.ai's automation platform — KYB/KYC checks, vendor onboarding, policy attestations.
Cap spend, require finance sign-off above thresholds, and export evidence to your ledger.
Codify runbooks with approvals for risky actions; ship signed post-incident attestations.
Policy-driven checks with replayable evidence; redaction/masking for PII tooling.
Four-eyes on prod changes; diff plans vs. execution and archive the proof.
Gate deployments on eval results, cost limits, and data access scopes—then prove you did.
ETL with tool contracts and immutable outputs; NDJSON/JSON-LD exports for audit.
Governed, agentic graph runtime with event-sourced provenance and policy-aware execution.
FastAPI service terminating REST, enforcing AuthN/Z, emitting OpenTelemetry. Routes verbs to Policy Engine and Stream Ingestor.
Pre/post execution policy evaluation: ABAC/RBAC, cost caps, SoD, PII/data-class gates, environment gates.
Consumes Redis Streams, normalizes events, enriches with metadata, writes to Neo4j, MinIO, and DuckDB.
Computes content hashes (BLAKE3/SHA-256), builds Merkle links, signs envelopes (Ed25519) with Identity/Key service.
Dispatches approved runs to tool runners behind contracts, streams tokens/logs, emits ToolCall* events.
Append-only node/edge writes to Neo4j, maintains latest-view projections, batch writer with idempotency.
Reviews and exports can be signed (Ed25519). Verify provenance at the edge. Public keys pinned to Actor nodes.
Enforce four-eyes on production changes and sensitive environments. Different approver from proposer required.
Constrain tool access by role, environment, and data class (PII). Scoped credentials per tool and environment.
Configurable evidence retention, WORM buckets, immutable windows, export bundles on demand (NDJSON/JSON-LD).
Launch the platform, call the API, or start with a Pack. You can always export your evidence.