↳ The Zero-Trust AI Stack — Platform

The Zero-Trust
AI Stack.

Securing the Agentic Economy

[KYDE]

The Zero-Trust AI Stack sits between your agents and every LLM provider. Every agent gets a cryptographic identity, enforced behavioral scope, and a court-ready evidence trail — without touching a single line of agent code.

<100ms

Added latency

100%

Provider coverage

0

Code changes required

↳ How it works

The proxy intercepts. Signs. Chains. Forwards.

KYDE runs as a local or hosted HTTP proxy, fully compatible with the OpenAI API schema. Any agent that can be pointed at a base URL can be governed.

terminal

$ export OPENAI_BASE_URL=https://kyde.intranet/v1

One environment variable. No SDK dependency. No code changes required.

01

Intercept

Every request from every agent routes through the proxy. The agent sees no difference.

02

Register

The request is matched to an agent identity and role. Budget and policy checks run before the call is forwarded.

03

Sign & Chain

An Ed25519-signed, SHA-256 hash-chained entry is written. Alter any record — every subsequent link breaks.

04

Forward

The original request continues to the LLM provider. Total added latency: under 100ms.

↳ Evidence capture

Every entry answers five questions.

Who

Agent ID, role, machine ID, user identity

What

Prompt, model, tool calls, response

Why

Last 5 messages as causal context

When

Millisecond-precise UTC timestamp

Proof

Ed25519 signature + SHA-256 hash chain link

audit_entry.json
{
  "entry_id": "e_7f3a2b1c",
  "sequence": 1847,
  "agent_id": "sales_bot_prod",
  "role": "customer_facing",
  "timestamp": "2026-03-15T14:23:07Z",
  "action": "chat.completion",
  "provider": "openai",
  "model": "gpt-4o",
  "tool_calls": ["crm.update_deal", "slack.send_message"],
  "input_hash": "sha256:9f86d0...",
  "entry_hash": "sha256:7b2e4d...",
  "prev_hash": "sha256:1c3f8a...",
  "signature": "ed25519:Mk3nR9..."
}
↳ Fleet management

Roles. Budgets. Boundaries. Per agent.

Every agent in your fleet gets a distinct identity and an assigned role. Roles determine what an agent is permitted to do — and what it costs you when it does it.

Core

Identity & Roles

Register every agent with a unique ID. Assign roles — infrastructure, customer_facing, internal_research, intern_sandbox. Roles carry permissions, not agents.

Fleet

Priority & Resource Allocation

Your production infrastructure agent gets priority over your intern's research bot. When token budgets run tight, critical agents aren't the ones that queue.

Fleet

Token & Cost Budgets

Set hard limits per agent, per role, or per team. Daily, weekly, monthly. No agent runs up a bill you didn't scope.

Policy

API Allowlists & Blocklists

Define which endpoints each role is permitted to reach. Your billing agent talks to the payment API. Your support agent doesn't.

Coming Soon

Behavioral Baselines & Anomaly Detection

Kyde learns what normal looks like for each role. When an agent deviates — unusual call volume, unexpected endpoints, out-of-pattern tool usage — you get alerted before it becomes an incident.

↳ Architecture

Gateway, not endpoint.

KYDE — Gateway Model

Agent A ──┐

Agent B ──┼──► KYDE ──► LLM API

Agent C ──┘

Central DB · One record

  • One deployment covers the entire fleet
  • Works with every agent, framework, and LLM
  • Central visibility — no aggregation required
  • No per-agent installation or configuration

Endpoint / Runtime Solutions

Agent A + Runtime ──► LLM API   ↓ Log A

Agent B + Runtime ──► LLM API   ↓ Log B

Agent C + Runtime ──► LLM API   ↓ Log C

  • Install on every agent separately
  • Framework- and runtime-specific
  • Fragmented logs — difficult to aggregate

Property

KYDE

Endpoint Solutions

Deployment effort

One ENV variable

Per-agent installation

Agent coverage

All agents, automatically

Each agent separately

Fleet management

Central roles, budgets, policies

Per-agent configuration

Audit trail

Single, tamper-evident record

Fragmented per agent

Code changes needed

None

Typically required

↳ Root of trust

Root of trust.
From software to silicon.

Each entry is signed with an Ed25519 keypair generated locally on first initialization. The hash chain ensures sequential integrity — tamper with any single entry, and every subsequent link breaks.

For environments where software-only signing isn't enough, Kyde's architecture is built for hardware-rooted attestation from day one.

No re-architecture required between levels. Same API. Same data format. Same evidence chain. The root of trust gets deeper — the interface stays the same.

Level

Mechanism

Status

Ed25519 Signed

Cryptographic signing at the point of capture — available now.

LIVE

TPM / HSM

Military-grade hardware isolation. Signing keys never exposed to host OS.

AVAILABLE

TEE (TDX/SEV-SNP)

Trusted Execution Environment attestation for maximum integrity.

AVAILABLE

FIPS 140-3

Architecture designed for FIPS-validated cryptographic modules.

AVAILABLE
↳ Product Core

Three guarantees. One stack.

Not a roadmap. A complete infrastructure layer that ships as a unit — covering every agent from day one.

01

SCOPE

No agent acts without ID & clearance.

Every action checked against policy before execution. Scope enforced at the proxy — not by trust.

  • Cryptographic agent identity & role assignment
  • Behavioral scope — API allowlists per role
  • Token & cost budgets enforced pre-call
  • Hard circuit breakers before external systems
  • Provider-agnostic — every model, every provider
02

TRACE

No incident without accountability.

Every incident traced to a single agent identity. Full chain reconstruction: source, path, destination.

  • Every action traced to a specific agent
  • Causal context — last 5 messages per tool call
  • Full decision chain reconstruction
  • Behavioral anomaly detection & alerting
  • Continuous data integrity verification
03

SEAL

Court-ready cryptographic audit trail.

Every entry signed. Provider-independent. Regulator-ready export on demand.

  • Ed25519-signed append-only ledger
  • Tamper-evident — alter any entry, every link breaks
  • Independent of LLM provider infrastructure
  • NIS-2, DORA, EU AI Act evidence trail

Optional High-Security Layer

Military-grade hardware isolation via TPM/HSM — signing keys never exposed to the host OS. For regulated environments where software-only signing isn't enough.

↳ Deployment

One environment variable.
0 code changes.

The stack sits outside your agent. It cannot be overridden by agent code — and it requires none. Any agent that can be pointed at a base URL is governed, immediately.

Sits outside the agent

Cannot be overridden by agent logic or bypassed by agent code.

No SDK dependency

No library to install, no wrapper to integrate, no runtime to manage.

Framework-agnostic

LangChain, AutoGen, CrewAI, custom — governed equally with one ENV variable.

Under 100ms latency

Governance is invisible to agent code and end users.

↳ Before vs. After

Install SDK on every agent

One ENV variable or Group Policy push

Framework-specific integration

Any base URL — every agent, every framework

Governance logic in agent code

Governance outside the agent. Immovable.

Re-integrate when model changes

Zero changes when switching providers

Three ways to deploy.

01 Developer / Single machine

Environment Variable

export OPENAI_BASE_URL= https://kyde.intranet/v1

Point any agent at the proxy with one ENV variable. Ideal for local development or single-machine deployments.

02 IT / Enterprise fleet

Group Policy

GPO → LLM_PROXY= https://kyde.intranet/v1

Push a single GPO that redirects all LLM API traffic through KYDE. No developer action, no application changes, no opt-in required.

03 Cloud / SaaS

Hosted Proxy

OPENAI_BASE_URL= https://your-org.kyde.io/v1

Managed deployment. Traffic routes through Kyde's infrastructure. Data-residency options available for EU-regulated environments.

↳ Compatibility

Provider-agnostic. Zero SDK changes required.

Provider

Status

OpenAI (GPT-4o, o1, o3)

Supported

Anthropic (all models)

Supported

Azure OpenAI

Supported

DeepSeek

Supported

Mistral / Ollama / Local

Supported

Google Gemini (via OpenAI compat.)

Supported
↳ Beyond LLM calls

Every action. One record.

Kyde governs not just LLM calls — but every tool your agents invoke. MCP servers, internal APIs, external services. The full execution surface. One tamper-evident record.

As the industry moves from apps to MCP infrastructure, governance needs to move with it — not stay scoped to the chat completion endpoint.

Action type

Governed

LLM Call

chat.completion, embeddings, any model request

✓ Yes

MCP Tool Call

crm.update, slack.send, db.query via MCP server

✓ Yes

Internal API

REST/gRPC calls made by agents to internal systems

✓ Yes

Agent-to-Agent

Delegation and sub-agent invocation

✓ Yes

External Service

Third-party API calls routed through the proxy

✓ Yes

↳ Get started

See the Zero-Trust AI Stack in action.

View Docs