AI governance in a container. Ship trustworthy multi-agent systems.
docker load < titanvault-0.2.0.tar.gz
docker run -d --name titanvault \
-p 8000:8000 titanvault:0.2.0
curl http://localhost:8000/health
git clone <repo>
cd titanvault/docker
docker build -t titanvault:0.2.0 .
docker run -d --name titanvault \
-p 8000:8000 titanvault:0.2.0
curl http://localhost:8000/health
Run bash demo/run_demo.sh or hit these endpoints manually:
Verify the container is running, all services are up, and the governance engine is initialized.
Confirm all 5 rule files are root-owned, chmod 444, and enforced. Immutable at runtime.
Full swarm status: trust scores per bot, ledger entry count, HMAC chain integrity, Jidoka thresholds.
EWMA trust for each agent. Scores decay on violations, recover on successful completions. Demotion at <0.75, frozen at <0.35.
Every bot action is written once, never mutated. HMAC-signed, sequence-monotonic. Tamper-evident by design.
Run the full 12-attack adversarial suite: constitution tampering, ledger replay, trust manipulation, privilege escalation, and more.
Full SMELT governance suite passed. Zero violations. Patent pending.
TitanVault embeds SMELT (Sentinel Multi-agent Execution and Ledger Technology), a governance framework that enforces constitutional rules, tracks trust scores, maintains an append-only ledger, and can halt the entire swarm if a bot falls below safety thresholds.
TitanVault Container +-------------------------------------------------+ | | | FastAPI :8000 SMELT Engine | | /health - ledgerd (append-only) | | /constitution - trust scorer (EWMA) | | /swarm/health - viper (12-attack red) | | /swarm/viper - jidoka (stop-the-line)| | - HMAC signing | | | | Constitution (chmod 444, root-owned) | | Ark | Hammer | Crucible | Phoenix | Scout | | | | Append-Only Ledger (JSONL) | | HMAC-chained, sequence-monotonic | | | | Ollama :11434 (gemma2:2b default) | +-------------------------------------------------+