Your AI, audit‑ready.

Runtime controls and signed audit trails for the AI behind your enterprise contract. Installed inside your stack, in days — not quarters.

Or inspect a sample audit packet →

Backed by
AI2 IncubatorPaul Allen’s AI institute Mighty CapitalSan Francisco Plug & PlaySunnyvale Safe AI FundGeoff Ralston SourdoughSeattle

The Loop

Four primitives. One installed runtime.

The questions an enterprise reviewer asks — can it be tricked, what stops it, did the controls fire, what evidence can we show our auditor — map to four primitives that ship as one runtime.

01 / SEE

Adversarial testing

Continuous probing across 19 attack categories. OWASP LLM Top 10 + MITRE ATLAS, against your live agent stack.

QUESTIONNAIRE · “How do you test for prompt injection and tool misuse?”

02 / CONTROL

Runtime controls

Tool allowlists, parameter validation, approval gates, redaction. Enforced at the action boundary, before the agent calls a tool.

QUESTIONNAIRE · “What controls run between the model and your systems?”

03 / PROVE

Signed audit trail

Every test, every blocked attempt, every controlled action signed on the OVERT 1.0 standard. Verifiable offline, without GLACIS in the loop.

QUESTIONNAIRE · “Can you prove the controls fired in production?”

04 / IMPROVE

Continuous regression

Findings flow back into the next testing run. Every fix becomes a regression test. The threat model can’t decay between releases.

QUESTIONNAIRE · “How do you keep up with new attack classes?”

Install in your stack

Five lines on the agent. One artifact for the auditor.

The runtime drops in beside your agent. The output is a signed evidence packet your customer’s security team, your auditor, your regulator, or your underwriter can verify offline.

SDK · TypeScriptWrap a tool call.

import { attest } from '@glacis/runtime';

const receipt = await attest({
  workflow: 'refund.issue',
  policy:   'acme.support.refund.v3',
  decision: 'BLOCK',
  rules:    ['amount.exceeds_threshold'],
});

// → signed OVERT receipt, verifiable offline

Auditor packet · OVERT 1.0What gets handed in.

Evidence PackAcme Support · Refund workflow · Q2 2026
Verified
Issuer
did:web:notary.glacis.io
Period
2026-04-01 → 2026-06-30
Receipts
1,247 control executions
Block events
14 · all signed, none silent
Schema
overt://schema/v1.0/runtime-attestation
Verifiable
Offline, against issuer public key
ED25519 · ed25519-2026-q2 · chain depth 1,247

Built for teams in review

Same runtime. Three buyer pulls.

The questions a security reviewer, an FDA reviewer, and a model-risk officer ask are different. The runtime evidence behind the answer is the same.

Get the packet your auditor will accept.

A 30-minute call. Walk one named workflow, see the runtime in your stack, and decide if the next 10 days save you a quarter.

Different use case, or just exploring? Get in touch.