What KYE™ actually adds.
KYE Protocol™ turns “an AI agent acted” into a signed, replayable, end-to-end record that the right people see in time — end user before approval, auditor on demand, court when needed — and that the wrong actions don’t get to take: scope-out → deny before bytes move; compromise → cascade in milliseconds.
Pick who you are. See what KYE™ delivers.
You see
Every AI agent that acts for you, with the exact scope — amount caps, merchants, time windows, payment instruments, expiry.
You control
Revoke any agent in milliseconds. Cascade fires: capability disabled, downstream grants invalidated, signal emitted, evidence pack generated.
You approve
Above-threshold actions hit your phone, not a vendor dashboard. The KYE Authority Wallet™ is the consumer-facing surface.
You can prove
If a transaction is disputed, the Evidence Pack™ is signed and replayable end-to-end with public keys alone.
Agentic procurement, scoped
Your AI shopping / sourcing agent acts under a signed authority grant: amount cap, merchant allowlist, category blocklist, time window, expiry. Above-threshold purchases require approval; below-threshold actions ship a signed Decision Map™ per transaction.
Treasurer / CFO control
Treasury authority is delegated, not blanket. Payment-authority chains map cleanly to KYE Treasury Profile™ and KYE Payments Profile™. Reconciliation has the chain as evidence, not a vendor log dump.
Vendor risk — verifiable
Every conformant gateway exports the same Evidence Pack™ format. Run the 41-fixture conformance pack against any vendor stack — pass / fail in minutes, byte-for-byte the same as the reference Gateway.
Dispute at the line item
When a counterparty disputes an agent purchase, hand them the Evidence Pack™ for that transaction. Verifiable offline with public keys. SME founders — not just enterprises — get this surface.
Agency-as-actor, not just regulator
A ministry authorises a programme. The programme delegates to caseworkers. Caseworkers delegate to AI assistants. Every step is a signed delegation in the chain — not a role in an LDAP group.
Maps to sovereign profiles
KYE Sovereign AI Profile™, KYE Public Sector Profile™, KYE Cross-Agency Delegation Profile™, KYE Government API Authority Profile™ — the four profiles that turn agency decision flow into replayable evidence.
Cross-agency without LDAP merging
Inter-agency delegations work via the Federation Profile. Trust domains stay sovereign; chains attenuate across them. No central directory required.
Citizen-impacting decisions, replayable
For benefits / housing / healthcare / justice, the decision and the chain that authorised it are signed and replayable end-to-end. Public-sector accountability stops depending on operator cooperation.
Replayable decision
When an AI-assisted public-sector decision affects you — benefits, housing, healthcare, justice — you (or your advocate) get a signed Decision Map™ that anyone can replay.
Right to appeal
Appeals stop being a paper-chase through Freedom-of-Information requests. The chain itself is the record: actor · principal · capability · authority · scope · state · policy · decision · audit · evidence.
Provenance of consent
The delegation chain back to a named human or business is the basis of the action. No “the algorithm decided” ambiguity.
Equal standing
Same evidence-pack format whether the system serves a citizen of one country or another. One protocol, every public service.
Bound, not blanket
Your actions inside the workplace are bound to a named delegation, not to a broad RBAC role. You can’t accidentally over-step.
Defensibly scoped
If something goes wrong, the chain shows exactly what was authorised — and what wasn’t. You aren’t silently blamed for an action you didn’t take.
Step-up when it matters
High-risk actions hit a step-up gate: a signed approval object that becomes part of the audit chain.
Recovery without a black box
Break-glass grants are time-boxed and signed. A reset isn’t an admin clicking a button; it’s a signed contract with an expiry.
A clear surface
You know the boundary you act within: capability, scope, state, time. Outside scope = a deny before bytes move.
Defence in depth
Inside scope, the signed Decision Map™ is your defence: it shows you were authorised when you acted.
Composability with MCP / SDKs
KYE™ composes with MCP, OpenAI Agents SDK, Vercel AI SDK, LangChain, Pydantic AI — doesn’t replace them.
Quarantine, not erase
If your behaviour is flagged you can be paused (quarantine state) without losing audit history — investigation possible without prejudice.
One contract
POST /v1/runtime/authorize instead of bespoke gates per vendor. Three SDKs (TypeScript / Python / Go).
Schema-first everything
158 JSON Schemas, 193 OpenAPI ops, 126 conformance fixtures. Every entity, decision, audit event, evidence pack — canonical.
Policy questions answered
You don’t need to invent a decision shape, a reason-code dictionary, or an audit format. KYE™ has them.
Verifiable with public keys
Webhook verifier, evidence-pack viewer, Decision Map™ renderer — all ship.
Transparency by construction
Public-key-verifiable evidence packs are the record — not vendor whitepapers. A journalist, NGO, or ombudsman verifies offline; no operator cooperation required.
Corruption resistance
Every authority delegation is signed and time-boxed; revocation cascades. A “quiet” back-channel grant is detectable on the chain. Break-glass is itself a contract with an expiry.
Public-service accountability
For citizen-impacting AI decisions (benefits, housing, healthcare, justice), the Evidence Pack™ is the artefact a parliamentary committee or court can replay end-to-end.
Equality of access to evidence
Same evidence-pack format whether the system serves one country or another. Civil society in lower-resourced jurisdictions gets the same forensic surface as in higher-resourced ones.
From N×M integrations to N+M.
Click a role for the before / after.
Toggle the view above. Tap any role node in the diagram to see what changes.
Eight stages. Same six primitives at every one.
KYE™ attaches at every stage, not just at the gate. Click a stage to see what runs.
Provision
Every entity (human, business, AI agent, service, model, tool, workflow) gets a stable URN from day 0. Same identity surface across humans and machines.
Eight properties that move the needle. Tap to expand.
Pre-action enforcement Before, not after expand_more
- Without
- Token has scope; runtime hopes the token-bearer is who they say. Verification is post-hoc.
- With KYE™
- Decision is checked against scope and state and policy before the action. The outcome is signed.
Cascade revocation Milliseconds, not days expand_more
- Without
- Compromise of one credential leaks for hours or days while downstream systems re-fetch tokens or reconverge.
- With KYE™
- One signal propagates through the trust graph; downstream grants invalidated before the next call.
Quarantine without erase Investigate first expand_more
- Without
- Often binary — revoke means lose history, don’t revoke means leave the door open.
- With KYE™
- Quarantine is a state. The entity is paused for investigation while the audit chain stays intact.
Step-up & human-in-loop First-class decision expand_more
- Without
- Each app reinvents step-up flows; approval requests are app-private state.
- With KYE™
- First-class decision codes (
require_approval,require_step_up,require_human_review). The approval request itself is a signed object in the chain.
Replayable accountability Public-key verifiable expand_more
- Without
- Vendor-side log dump; narrative reconstruction; trust the vendor’s account of what happened.
- With KYE™
- Public-key-verifiable replay from the principal down to the action. Audit, Decision Map™, Evidence Pack™ are all signed.
Dispute resolution Burden flips expand_more
- Without
- The disputing party has to extract evidence from the operator. Vendor cooperation determines speed.
- With KYE™
- Evidence Pack™ is the artefact, in a stable schema, signed. The chain can be verified offline by either side.
Break-glass & recovery Contract, not button expand_more
- Without
- Black box: an admin clicks a button, you trust the audit log was right.
- With KYE™
- Recovery is itself a contract: signed request → signed decision → signed proof artefact → time-boxed grant → expiry signal. Every step is on the chain.
Blast radius See, then revoke expand_more
- Without
- “What does that compromised credential touch?” becomes an engineering investigation. Pull DAGs out of vendor docs.
- With KYE™
- Blast Radius Map™: graph of every capability, agent, payment, and decision affected — before you revoke. Pre-emit, helps operators choose the right action.
Continuity. Discoverability.
Identity, authority, scope, state, decision, audit, evidence are what KYE™ records. The two newest profiles add the next layer: did the action remain aligned from intent to execution (Continuity), and can authorised teams find the chains, decisions, evidence and risk that matter (Discoverability).
KYE Continuity Profile™
Authority Continuity™ — from intent to action, across every dimension.
- Intent drift — agent reinterpreted the goal materially (subscription when the constraint said no subscription) →
require_human_review - Incentive conflict — commercial / affiliate / commission optimisation conflicts with principal interest →
deny - Pressure signal — principal under urgency / coercion / social engineering →
require_reconfirmation - Oversight chain integrity — required human-in-the-loop missed → quarantine + signal on KYE Signal Bus™
- Replayable proof — signed Continuity Evidence Pack™ binds intent + interpretation + authority + state + decision + execution into one bundle
KYE Discoverability Profile™
Make delegated agency findable — without exposing sensitive data.
- Find every agent that can move money — one query, masked + audited, purpose-bound
- Find authority grants expiring this week — before they go stale in production
- Find evidence for this disputed transaction — auditor / regulator / court reach for the pack directly
- Find blast radius for a compromised credential — before you revoke
- Find conformant vendors / connectors / certified implementations — procurement queries the public registry
Risk officer: find every agent that can move money. Spot incentive drift before it hits production. Replayable continuity proof per decision.
Auditor: discovery query → evidence pack offline-verifiable with public keys; every decision carries a continuity status + score.
CISO / security admin: stale-authority + over-permissioning detection; blast-radius discovery; oversight-chain integrity alerts.
Procurement: certification registry + connector hub queries; KYE Conformant™ / KYE Certified™ filters.
Builder: find profiles, connectors, apps, plugins matching your sector. Run continuity-check fixtures locally.
In one line.
KYE™ turns “an AI agent acted” into a signed, replayable, end-to-end record — one the right people see in time, and one the wrong actions don’t get to take.
Ready to see your AI agents flagged?
Start in shadow mode. We’ll deliver your first Evidence Pack™ in 4–8 weeks.