Cryptographic enforcement for autonomous AI agents.
Kevros issues cryptographically signed release tokens before any agent action executes. No token, no action. Every enforcement decision is hash-chained and signed using NIST post-quantum standards (FIPS 204 and FIPS 205), producing a tamper-evident, independently verifiable record. CMMC Level 2 self-assessed. Built for defense-grade procurement.
The requirement is cryptographic, not documentary.
CMMC Level 2 (self-assessed) requires rigorous controls over information systems. NDAA Section 1513 directs DoD to establish enforceable AI accountability requirements for covered systems. Kevros provides the cryptographic enforcement evidence those frameworks require. The EU AI Act adds runtime guardrails for high-risk systems. Auditors need cryptographic proof, signed and chained, that the right authorization was enforced at the right moment.
Kevros produces that proof at request time, not post-hoc.
Three primitives. Every claim is verifiable.
Cryptographic enforcement
FIPS 204 ML-DSA-87 signatures on every release token. Fail-closed by design.
Tamper-evident evidence
SHA-256 hash-chained ledger. Independently verifiable. Evidence pack available on request.
Formally verified
1.94B-state TLA+ model of the release-token protocol. Three patents filed (USPTO docket pending).
TLA+ specifications, Lean 4 proofs, and the compliance manifest are published in the public verification repository. The protocol specification, verification artifacts, and evidence pack are available to qualified buyers on request.
Regulation is already scheduled. Enforcement has to be live.
| Regulation | Date | What Kevros provides |
|---|---|---|
| NDAA Section 1513 | June 2026 | Requires cryptographic enforcement of AI agent actions for covered DoD systems. Kevros signs every release token with ML-DSA-87 and emits a hash-chained evidence record. |
| EU AI Act, runtime guardrails | August 2026 | High-risk AI systems must demonstrate runtime controls with auditable evidence. Kevros provides the signed, chained record at request time. |
| NIST Agentic AI | Active now | Kevros architecture maps to NIST AI RMF and the agentic AI extension. |
Three differences. One proof point each.
Quantum-ready cryptography
ML-DSA-87 (FIPS 204 final) + SLH-DSA-256f (FIPS 205). NSA CNSA 2.0 quantum-resistant.
Vendor-independent
Seven integration protocols: x402, L402, MPP, Stripe, PayPal, Lightning, Solana. Works with any model provider via the agent SDK.
Patent-protected technology
Three patents filed on the cosign + release token + permission-before-power architecture.
Patent applications: available on request via legal@taskhawktech.comA single CONSTRAIN decision, fully verifiable.
Every action produces a record like the one below. Every field is independently verifiable by a third party using the public tooling.
{
"decision_id": "constrain-2026-04-08T14:22:07Z-7f3a",
"agent_id": "agent-prod-001",
"action": "fs.write",
"target": "/var/reports/q1-summary.pdf",
"policy_hash": "sha256:2b9c...e41",
"prev_hash": "sha256:a04f...77d",
"timestamp": "2026-04-08T14:22:07.814Z",
"verdict": "ALLOW",
"release_token": "mldsa87:...",
"signer": "kevros/cosign@v1.4.2",
"signature": "mldsa87:3c1d...b9e"
}
Every decision_id is independently verifiable. The evidence pack includes verification tooling and reference chains.
API note: the gateway returns the verdict literal CLAMP for backward compatibility. CONSTRAIN is the canonical name for that decision class in our documentation.
Three entry points.
Commercial
Enforce agent actions across production workloads. Runs on any model provider and integrates with your existing billing, IAM, and observability.
Talk to our teamDefense & Federal
CMMC Level 2 self-assessed. NDAA Section 1513 aligned. Evidence pack available on request.
Chat with an expertIntegrate Kevros
SDK, quickstart, and a curl example that returns a signed release token in under 30 seconds.
Read the docs