The Core Philosophy: Why "When" is No Longer Enough
In traditional software, logs are linear. In the age of autonomous AI agents, execution is
asynchronous, distributed, and non-deterministic. An agent might spawn three sub-processes
across different server regions. If you rely on NTP (Network Time Protocol) timestamps to
audit this, you are blind.
LockStock Guard abandons the reliance on server clocks. Instead, we utilize
Causal Graph Auditing. We cryptographically
chain every agent action to its predecessor. We don't just tell you that an API call happened
at 12:01 PM; we prove mathematically that Action B was the direct result of Action A, creating
an unbreakable chain of evidence that stands up in court.
Feature Deep Dive: The "Kill Switch" Architecture
Real-Time Velocity Anomaly Detection
AI agents can hallucinate. When they do, they don't just make a mistake; they make mistakes
at the speed of light. A rogue agent might execute 1,000 erroneous database writes in the
time it takes a human analyst to sip their coffee.
How it works: Guard monitors the "semantic velocity" of your agents. It
establishes a baseline for normal operation (e.g., "This agent usually queries the billing
API twice per hour").
The Trigger: If the agent accelerates beyond the defined velocity—attempting
50 queries in a minute—Guard flags the anomaly instantly, independent of the payload content.
Automated Circuit Breakers
Detection is useless without intervention. LockStock Guard implements the industry's first
Identity-Layer Circuit Breaker.
The Mechanism
Upon detecting a velocity or logic anomaly, Guard doesn't just alert you; it severs
the agent's cryptographic passport.
The Result
The agent is instantly unauthorized across your entire architecture. It can continue
to "run," but its API keys are mathematically voided. The damage stops immediately,
giving your team time to investigate.
The Compliance Engine: Mathematical Non-Repudiation
For banking, healthcare, and defense, "we think this happened" isn't good enough. You need proof.
Per-Action Credential Rotation
Traditional systems rotate credentials every 30-90 days, creating long exposure windows when
compromised credentials remain valid. LockStock Guard eliminates this gap entirely through
cryptographic state evolution—credentials rotate on every single action.
Business Impact: Zero-second replay windows vs 90-day exposure. Demonstrate
continuous compliance to auditors and stakeholders. Support faster enterprise sales cycles with
built-in compliance certification.
Compliance Automation
-
Immutable Ledger: Every decision an agent makes is hashed and signed.
This creates a "Merkle Tree" of agent history.
-
No "Lost" Logs: Because every event is parented to a previous event,
a missing log file is immediately detectable as a broken link in the cryptographic chain.
You cannot delete a record without invalidating the entire identity.
-
Audit-Ready in 48 Hours: Export reports specifically formatted for SOC2, HIPAA,
and PCI DSS auditors that visualize the causal flow of data, proving that no unauthorized
divergence occurred. Industry benchmarks show audit cycle time reduced by 60-70% with automated evidence.
SOC2 Compliant
HIPAA Ready
PCI DSS
Merkle Tree Verification
Technical Integration: How it Fits Your Stack
Sidecar Deployment
LockStock Guard runs as a lightweight sidecar to your LLM or Agent container. It adds
less than 5ms of latency.
Dashboard Visualization
The View: Instead of a text list, the Guard Dashboard displays a
Topology Graph.
The Insight: You see the "family tree" of agent decisions. You can
visually trace a financial transaction back through the sub-agents to the original user prompt.
# Example: Deploy Guard as a sidecar
docker run -d \
--name lockstock-guard \
--network agent-network \
-e AGENT_ID=trading-bot-001 \
-e VELOCITY_THRESHOLD=50 \
-e CIRCUIT_BREAKER=enabled \
d3cipher/lockstock-guard:latest
Enterprise Pricing
Professional
$999/month
up to 50 agents
~$19.98/agent/month
- [OK] Per-action credential rotation
- [OK] Real-time velocity monitoring
- [OK] Causal graph auditing
- [OK] Topology visualization
- [OK] Audit-ready SOC2/HIPAA exports
- [OK] 1-year compliance retention
- [OK] Priority support
ENTERPRISE
Enterprise
$2,499/month
up to 250 agents
~$9.99/agent/month
- [OK] Everything in Professional
- [OK] Circuit breaker protection
- [OK] Enterprise dashboard
- [OK] Deliver measurable ROI to stakeholders
- [OK] Custom compliance reports
- [OK] 7-year PCI-DSS retention
- [OK] Dedicated support + SLA
- [OK] SSO/SAML integration
Enterprise Scale (250+ agents): Starts at $2,499/month base + usage-based pricing
Custom integration support • White-glove onboarding • Volume discounts available
Industry data: Average AI breach costs $4.44M. Shadow AI adds $670K. Rogue agents burn thousands daily.
Schedule Architecture Review
"Stop trusting timestamps. Start verifying causality."