Skip to main content

aflock

Cryptographically signed policies for constrained AI agent execution

Constrain

Define what AI agents can do with signed .aflock policy files. Set spend limits, tool restrictions, file access patterns, and domain allowlists.

Attest

Every agent action produces a cryptographically signed in-toto attestation. The agent never sees the signing key — unforgeable proof of compliance.

Verify

Verify constraint compliance after the fact with a 6-phase verification algorithm. Cross-step Rego evaluation, merkle tree ordering proofs, and sublayout recursion.