Skip to content
View selfradiance's full-sized avatar

Block or report selfradiance

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
selfradiance/README.md

selfradiance

I build narrow open-source proofs for AI agent accountability and governance. The work is organized around specific seams where agent systems fail: instruction intake, pre-execution policy, governed execution, delegated authority, bonded human judgment, substrate, and adversarial pressure. Each repo makes a deliberately small claim and stays local-first when possible.

Start here

If you're new, use this order:

  1. agentgate-governed-writefile-demo — the fastest outsider-readable proof path through governed write_file
  2. agentgate-mcp-firewall — the verification layer that checks whether governed filesystem calls produced the effects they claimed
  3. agentgate — the deeper accountability substrate underneath that path

Ecosystem map

Instruction intake

  • governed-repo-intake — local deterministic intake gate for instruction-bearing repo surfaces; explicit human acknowledgment is required before approval, and approval is not a safety verdict

Pre-execution policy gates

  • ActionProof — deterministic allow/deny gate for one credentialed tool request before execution; asks whether a call should happen at all
  • SecretBoundary — deterministic gate for one outbound webhook-style payload crossing explicit secret boundaries before execution

Governed execution / effect verification

  • agentgate-governed-writefile-demo — smallest outsider-readable proof path through governed write_file: intended call, real on-disk effect, and inspectable audit artifacts
  • agentgate-mcp-firewall — thin governance proxy; on its current shipped proof surfaces it independently verifies two narrow filesystem effects (write_file and delete_file) instead of trusting upstream success claims

Delegated authority

  • agentgate-delegation-proof — bounded delegated authority with a checkpointed execution path and a local append-only transparency log; not tamper-evident anchoring

Bonded human judgment

Substrate

  • agentgate — collateralized execution engine and accountability substrate underneath much of the ecosystem

Adversarial evaluation and simulation

How these fit together

AgentGate is the substrate. Some repos govern what instruction-bearing material gets admitted before work starts. Some ask whether a tool call should happen at all. MCP Firewall then handles a narrower and different question: whether a governed filesystem call produced the effect it claimed after execution on its current proof surfaces. Other repos explore bounded delegation, bonded human judgment, or adversarial pressure. The point is layered narrow proofs, not one giant framework.

Strongest proof path right now

For the fastest concrete entry point, start with agentgate-governed-writefile-demo. If you want the current filesystem verification layer behind that demo, read agentgate-mcp-firewall next. If you want the deeper engine underneath both, read agentgate after that. It is the substrate, not the first repo most cold visitors should begin with.

Other notable projects

Pinned Loading

  1. agentgate-governed-writefile-demo agentgate-governed-writefile-demo Public

    Smallest outsider-readable proof path through AgentGate + MCP Firewall: governed write_file, independent on-disk verification, and inspectable audit artifacts.

    TypeScript 2 1

  2. agentgate-mcp-firewall agentgate-mcp-firewall Public

    Governance proxy for MCP tool calls with narrow independent verification for governed write_file and delete_file effects.

    TypeScript 1

  3. agentgate agentgate Public

    Collateralized execution engine for AI agents: bond-and-slash accountability with Ed25519 identities, bounded exposure, and progressive trust tiers.

    TypeScript 5

  4. ActionProof ActionProof Public

    Deterministic pre-execution gate for one credentialed tool request: explicit policy, allow/deny decision, and inspectable decision artifact.

    TypeScript

  5. governed-repo-intake governed-repo-intake Public

    Local deterministic intake gate for instruction-bearing repo surfaces with explicit human acknowledgment before approval.

    TypeScript

  6. agentgate-delegation-proof agentgate-delegation-proof Public

    Bounded human-to-agent delegation with checkpointed execution, dual-bond accountability, and a local append-only transparency log.

    TypeScript