AI cannot act without authority

Prevent unauthorized payments, destructive tool calls, data loss events, and autonomous workflow drift — before they happen. VERIDACT is the structural boundary between AI cognition and real-world consequence: a cryptographic enforcement layer that makes unauthorized AI execution architecturally impossible.

Enforcing in production
Book technical review

Proof of enforcement

Logs are claims.
Proof is different.

An enforcement log tells you what a system recorded. A log is a claim made by the party you are evaluating. Every claim requires trust in the claimant.

VERIDACT produces cryptographic proof bundles. Download one from any blocked decision. Run the standalone verifier binary. No VERIDACT services running. No network connection. No trust required. The mathematics either verify or they do not.

The proof is independently verifiable by any party — auditor, regulator, counterparty — at any time, with no ongoing relationship with the vendor.

Every decision is Ed25519 signed and SHA-256 hash-chained. Tamper-evident by construction, not by policy.

veridact-verify — offline, no network required

The execution layer

Between when an AI decides to act and when that decision reaches any real system, there is a gap. That gap has never had a product built for it. VERIDACT is that product.

I — The Boundary

Structural, not behavioral

Execution cannot proceed without a signed authority token issued by the authority device. The boundary is architectural — a mathematical constraint, not a policy setting. It cannot be misconfigured. It cannot be social-engineered.

II — The Mechanism

One path. No exceptions.

Every AI agent action passes through a single enforcement path. There is no test mode, no development override, no flag that disables enforcement. Unknown state always resolves to denial. The system is incapable of producing an unauthorized execution.

III — The Evidence

Verifiable without trust

Every enforcement decision produces a proof bundle verifiable by a standalone binary with no running infrastructure. A regulator can confirm that a specific AI action did not occur — without trusting the vendor, without any relationship with the vendor.

One path.
No bypass.
No exceptions.

Every AI agent action passes through a single enforcement path before it reaches any external system. What follows is not a process diagram — it is the physical sequence of events.

01

Intent

An AI agent proposes any action — payment, data operation, infrastructure command, physical system control, external communication.

02

Intercept

VERIDACT receives the request before it reaches any external system. The agent is reasoning. The world has not changed.

03 — Authority Boundary

The only path

Identity verified. Policy evaluated. Intelligence checked. A signed token is issued — or withheld. This is the only path. There is no other.

04

Evidence

A hash-chained record is written and signed. A proof bundle is constructed. Verifiable independently and permanently.

05

Reality

On authorization: execution proceeds with a signed contract. On anything else: zero API calls, zero mutations — and cryptographic proof of each.

Allow

Authorized release

Signed token issued. Execution proceeds. Proof of authorized action generated.

Hold

Human gate

Action suspended for operator approval. The agent cannot proceed.

Stop

Hard block

Policy hard stop. No token issued. Cryptographic proof of non-execution generated.

Failed closed

Unknown state

Ambiguity resolves to denial. The system cannot execute under uncertainty.

Deploys in front of

LLM agents
Internal copilots
Autonomous workflows
Payment systems
Cloud APIs
Databases
Physical control systems
Communications infrastructure

Sovereign deployment

Remove the device.
Execution stops.

That is not a software configuration. That is hardware-grade authority control. The Ed25519 signing key is generated on a physical device at the deployment ceremony. It never touches a host filesystem. It is never transmitted over a network. It never leaves your facility.

VERIDACT deploys entirely inside your infrastructure. Every service, database, and log runs in your environment under your control. There is no call-home. No telemetry. No vendor dependency on the enforcement path.

VERIDACT has no access to your system after the deployment ceremony. You hold the authority the same way you hold a key.

01Customer-deployed — your cloud environment, your network, your IAM. Provisioned once. Operated by you.
0218 enforcement services — gateway, authority boundary, enforcer, evidence chain, identity, policy engine, intelligence, operator console, and more.
03Physical authority device — the Ed25519 signing key is generated on hardware. Never on disk. Never on network. Physical sovereignty over digital authority.
04Enforcement across domains — financial transactions, data operations, infrastructure commands, physical systems, communications, legal filings.

Where unauthorized AI execution causes the most damage.

VERIDACT enforces a cryptographic boundary in front of AI agents across every domain where a single unauthorized action can trigger cascading real-world consequence.

Financial Services

An AI agent executes a $2M wire transfer your CFO never approved.

AI-powered treasury and payment agents operate at machine speed. A single misconfigured policy, a prompt injection, or a runaway workflow can initiate transactions before any human has time to intervene. By the time the log is reviewed, the funds have moved. The audit trail proves what happened — not what didn't.

VERIDACT enforcement

Every payment, wire transfer, trade, and credit action passes through the authority boundary before execution. Thresholds enforce human approval gates. STOP outcomes produce cryptographic proof the transaction never occurred — verifiable by your auditor without VERIDACT running.

Healthcare

An autonomous clinical AI adjusts a patient's medication dosage without physician confirmation.

AI agents in clinical decision support and device management operate close to patient outcomes. The gap between a recommendation and an action is closing. When an AI agent crosses that boundary without authorization, the consequence is not a compliance finding — it is a patient. Logs document the failure after it happens.

VERIDACT enforcement

Medication administration, prescription issuance, device adjustment, and procedure initiation are STOP classes by default — requiring explicit authority before any action reaches a clinical system. Every blocked action is cryptographically signed. Every authorized action carries a verifiable contract.

Aviation

An AI flight management system modifies a navigation route mid-flight without crew authorization.

Autonomous systems in aviation operate under strict certification requirements — but AI agents increasingly influence or initiate actions outside those certified paths. An unapproved command to a flight management system, a navigation override, or an emergency declaration by an autonomous agent represents a category of risk that no log can retroactively prevent.

VERIDACT enforcement

Takeoff, landing, navigation, system modification, and emergency response are HOLD or STOP classes — structurally requiring crew authorization before any command is transmitted. The authority device is physical. Removing it ends all autonomous execution immediately.

Manufacturing & Robotics

An AI production controller starts industrial machinery before operator presence is confirmed.

AI agents managing production lines, robotic assembly, and conveyor systems can initiate physical movement faster than any human safety check. A single unauthorized machinery start in the wrong sequence causes equipment damage, production loss, or injury. Current safety systems are mechanical — the AI that circumvents the sequence is not.

VERIDACT enforcement

Machinery start, conveyor control, robotic welding, and assembly initiation require an operator-present confirmation gate. No physical action proceeds without a signed authority token. The HOLD queue ensures human confirmation before execution — not after.

Cloud Infrastructure

An AI DevOps agent modifies firewall rules across a production environment at 3am.

Autonomous infrastructure agents run continuously. They can deploy, modify, and destroy cloud resources at machine speed. A prompt injection, a reasoning error, or an ambiguous instruction can trigger a firewall modification, network reconfiguration, or database migration that exposes production systems before any human is aware. The blast radius is immediate.

VERIDACT enforcement

Firewall modification, network reconfiguration, server deployment, and access grants are HOLD or STOP classes. Every infrastructure action requires a signed token. The circuit breaker ensures that a downstream failure never silently degrades into an unauthorized execution.

Enterprise IT

An AI IT agent grants production database access to a contractor account that should have been offboarded.

AI agents handling access provisioning, certificate issuance, and identity management operate across the most sensitive surfaces in an enterprise. An unauthorized access grant, a misconfigured permission, or a certificate issued to the wrong identity creates exposure that may not surface until a breach occurs. The log proves what was granted — not what should not have been.

VERIDACT enforcement

Access grants, access revocations, and certificate issuance require operator approval before execution. Every identity action carries a signed contract binding the agent, the action, and the timestamp. Revoked agents return FAILED_CLOSED immediately — no authorized execution is possible.

Electric Utilities

An AI grid management agent reroutes power load across a regional transmission network without operator authorization.

AI agents managing grid balancing, load dispatch, and demand response operate on infrastructure where a single unauthorized switching action can cascade into a regional outage. The grid does not tolerate unauthorized commands. A rerouting decision made at machine speed, without human oversight, can destabilize frequency, trip protective relays, and leave millions of customers without power before any operator can intervene.

VERIDACT enforcement

Network reconfiguration, load dispatch commands, and infrastructure switching are HOLD or STOP classes — structurally requiring operator authorization before any command reaches grid control systems. The authority device is physical. If the device is removed, every AI agent in the environment stops executing immediately. No partial states. No degraded modes.

Nuclear Power

An AI process control agent issues a command to adjust reactor coolant flow without licensed operator confirmation.

Nuclear facilities operate under regulatory frameworks that mandate licensed operator authorization for every safety-significant action. AI agents introduced into process monitoring, anomaly detection, or control assistance exist in an environment where the boundary between recommendation and command must be structurally enforced — not assumed. An AI that can suggest an action and an AI that can execute one are not the same system. The consequences of conflating them are not recoverable.

VERIDACT enforcement

Every process control action, system adjustment, and safety-system interaction is a STOP class by default — requiring a licensed operator's explicit authorization via the physical authority device before any command is issued. VERIDACT produces a cryptographic proof bundle for every decision — authorized or blocked — providing the auditable chain of custody that nuclear regulatory compliance demands.

The boundary between cognition and consequence

has always
needed a
guardian.

Now it has one.

Enterprise deployment · Technical review · Partnership


info@veridact.co

VERIDACT is available for enterprise deployment.
Contact to book a technical review or discuss partnership.