This is what governed execution looks like.
Every decision below came from a production system. Not a sandbox. Not a simulation. Real actions evaluated before execution, real policy enforcement, real cryptographic evidence — streaming now.
Recent governed decisions.
Every row is a real decision — evaluated before execution, hash-sealed, and independently verifiable. Current chain status: intact.
| When | Capability | Source | Decision | Evidence | |
|---|---|---|---|---|---|
127 capabilities. Every one classified.
Every governed capability is assigned a risk tier. Higher risk means tighter constraints, mandatory approvals, and stricter evidence requirements.
Six structural guarantees.
These claims are backed by public verification surfaces — enforced at build time, visible in every evidence record, and independently checkable without Strix infrastructure.
governedProcedure(). 17 build-time invariants enforce this. There is no path to the mutation layer without evaluation.crypto. No Strix account. No SDK required. The math is the proof.A screenshot is an illustration. Proof is public.
Screenshots of intercepted actions show the user experience, not the integrity claim. Verification happens through public records, cryptographic signatures, chain continuity, and JWKS-published keys — inspectable by anyone, without a Strix account.
- An action was intercepted before execution
- A human-readable decision label (allow / intercept / deny)
- A capability name and risk tier
- The moment in time the user saw it
- Hash integrity — SHA-256 over the canonical payload matches the stored hash
- Chain continuity — each record links to the prior record's hash
- Signature validity — Ed25519 signature verifies against the canonical payload
- Key ID + algorithm —
kidresolves to a public key published via JWKS; algorithm is declared and checked - Verification result — VERIFIED / LEGACY_UNSIGNED / SIGNATURE_INVALID / HASH_MISMATCH / SIGNING_KEY_UNKNOWN / COMPLIANCE_VIOLATION
Verify any record yourself.
You don't need a Strix account. You don't need our SDK. The proof is in the math, not our word.
Enter any evidence hash or record ID from the trail above. Verification uses Ed25519 signatures and JWKS-published keys — the same cryptographic standard used in financial infrastructure. No account required.
See Strix govern your system.
The demo takes 15 minutes. You'll see a live policy evaluation, a blocked action, and a cryptographic evidence record — all in production. Currently in private beta, limited spots available.