Set up AI agent governance for your organization. No engineering degree required.
This guide is for you if your title includes words like Compliance, Risk, Audit, or Governance and someone just told you the company is deploying AI agents. You need to know what LockStock does, how to set it up, and what to tell the regulators.
You do not need to write code. You do need a web browser and about 30 minutes.
LockStock creates an immutable, cryptographic audit trail for every action your AI agents take. Think of it as a tamper-evident flight recorder: every prompt sent, every response received, every tool invoked — all logged in a hash chain that cannot be rewritten after the fact.
When a regulator asks "how do you know what your AI did on Tuesday at 3pm?", the answer is: "We have a mathematically verifiable record. Here's the proof."
lsk_admin_*) — full dashboard access, agent provisioninglsk_gateway_*) — goes in the container, stamp-only accessWhat just happened: You created a tenant account. All agents you register will belong to this account, and all audit logs will be scoped to you. No one else can see your data.
For each AI agent your organization runs, you'll create a registration in the dashboard:
customer-support-bot, document-classifier)Important:
The genesis token expires in 24 hours and can only be used once. If it expires before your engineering team uses it, simply delete the agent and create a new one. This is a security feature, not a bug.
Send the genesis token and agent name to whoever manages the AI agent's infrastructure. They will use it in Step 4. You do not need to do Step 4 yourself (but you can if you want to).
Send your engineering team this message (copy and paste is fine):
We need to add LockStock audit logging to [AGENT NAME]. I'll send you these credentials via secure channel: - Admin Key (lsk_admin_*) — you need this for setup - Gateway Key (lsk_gateway_*) — goes in the container - Registry Username + Token — for pulling Docker images Setup steps: 1. Follow the welcome email or https://d3cipher.ai/docs-gateway-quickstart.html 2. Install Liberty (secrets manager): pipx install liberty-secrets 3. Store the credentials in Liberty, pull the images, extract the CLI 4. Activate the agent I provisioned: lockstock-gateway activate --agent "[AGENT_ID]" --token "[GENESIS_TOKEN]" 5. Start the gateway: lockstock-gateway start 6. Point each agent at http://localhost:4000 instead of the AI provider Full guide: https://d3cipher.ai/docs-gateway-quickstart.html No code changes to the agents. Should take about 20 minutes.
That's it. The engineering work is a configuration change, not a rewrite. The full guide walks them through every step.
You don't have to do this step. This is what happens on the engineering side, so you know what to expect:
lockstock-gateway activatelockstock-gateway start# Point agents at the gateway instead of directly at the provider OPENAI_BASE_URL=http://localhost:4000 # OpenAI agents ANTHROPIC_BASE_URL=http://localhost:4000 # Anthropic / Claude agents
Zero code changes to the agent itself. The d3cipher Gateway sits between the agent and the AI provider (OpenAI, Anthropic, etc.) as a reverse proxy. The agent doesn't know it's being audited.
Once engineering confirms the agent is running with LockStock:
If you see entries appearing, congratulations: you have a working audit trail.
Set up your Account Key for encrypted transcript access:
Send your Account Key to your engineering team via secure channel. They need to store it
in Liberty (liberty add LOCKSTOCK_ACCOUNT_KEY "...") and restart the gateway
for transcript encryption to activate. Without it, the audit trail still works — you
just can't read the content of prompts and responses.
Why this matters: Transcripts are encrypted end-to-end. The LockStock server stores the ciphertext but cannot read it. Only someone with your Account Key can decrypt agent transcripts. This is how you prove to auditors that even your vendor cannot access your AI conversations.
When regulators ask about your AI governance framework, here's what you have:
Every AI agent action is logged in a cryptographic hash chain. Each entry is linked to the previous one. Tampering with any entry breaks the chain and is immediately detectable. This is not a database log that someone with admin access can edit — it's a mathematical proof of sequence.
Full transcripts (prompts and responses) are encrypted before they leave your infrastructure. The audit service stores ciphertext it cannot decrypt. Decryption requires your Account Key, which only your team possesses. Your vendor cannot read your AI conversations.
LockStock monitors agent behavior for anomalies: unusual request velocity, unexpected task types, sequence gaps. A circuit breaker can automatically halt an agent that exceeds defined thresholds. You can enable or disable ML-based anomaly scoring per tenant from the dashboard Settings.
Each agent has a unique cryptographic identity derived from its hash chain. Agents are authorized for specific task types only. An agent authorized for "customer support" cannot suddenly start executing "financial trades" — the system will reject the action and log the attempt.
Transparency matters. Here's what falls outside LockStock's scope:
lockstock-audit --from-seq N --to-seq M --format json — each entry carries its chain hash, payload hash, and timestamp. The cryptographic proof is embedded in the data.LockStock's audit trail doesn't ask you to trust us. Every chain entry includes a payload hash — a SHA-256 fingerprint of the exact content that was recorded. You can independently verify that the encrypted content matches the hash in the chain, without trusting any of our display code.
The --raw flag outputs the exact canonical bytes that were hashed into the chain.
Pipe them to sha256sum and compare the result to the payload_hash in the audit log.
If they match, the content is the same content that was recorded at stamp time.
# Step 1: Get the payload_hash for an entry from the audit log lockstock-audit --from-seq 500 --to-seq 500 --format json | jq '.[0].payload_hash' # → "a1b2c3d4e5f6..." # Step 2: Hash the raw canonical bytes independently lockstock-audit --from-seq 500 --to-seq 500 --raw | sha256sum # → a1b2c3d4e5f6... - # If they match: the content is intact. No trust required.
Open the dashboard → Fleet tab → select an agent → click Verify Chain. The dashboard checks every link in the hash chain and reports any breaks. A passing verification means no entries have been inserted, removed, or reordered since the chain was created.
What this proves to a regulator: The audit trail is not a database that an administrator could quietly edit. Each entry is cryptographically linked to the previous one. Changing any entry breaks the chain — and the break is detectable by anyone with the Account Key, without needing access to d3cipher's infrastructure.
SHA-256(decrypted content) == payload_hash, the content is intact.