Protocol v1.0 — Open Source

Stop Rogue AgentsBefore They Act.

Agent IdentityTrust ScoringPolicy EnforcementRevocation

Tessorium prevents unauthorized AI agent actions with real-time enforcement, instant kill switches, and human-in-the-loop controls — so enterprises can deploy autonomous agents safely and compliantly.

THE_PROBLEM

Logging tells you what happened.

Prevention stops it from happening.

Identity is assumed, not verified

No cryptographic proof of who authorized what—or whether the agent stayed in bounds.

No guardrails or kill switch

One mistake cascades across systems. You need human-in-the-loop controls that actually work.

EU AI Act demands more

Article 14 requires human oversight of high-risk AI. Reactive logging won't pass audit.

Tessorium prevents unauthorized actions. Not just logs them for later.
THE_FOUR_PILLARS

Prevention, not just detection

Every interaction verified and enforced before it happens.

[ IDENTITY ]

Verify before you trust

Ed25519 cryptographic identity for every agent. Prove which human authorized which agent—and that the agent stayed in bounds.

  • Unique keypairs & DIDs
  • Challenge-response verification
  • Full authorization chain
[ POLICY ]

Enforce rules proactively

Security Policy Language (SPL) lets you define exactly what agents can do. Policies are enforced before actions execute—not logged after.

  • Human-in-the-loop controls
  • Kill switches that work
  • EU AI Act Article 14 ready
[ TRUST + REVOCATION ]

Real-time risk scoring

Combine identity, reputation, and fraud signals into instant decisions. Revoke compromised agents in under 50ms.

  • Sub-100ms trust decisions
  • Fraud detection built-in
  • Instant credential revocation
[ AUDIT ]

Tamper-proof accountability

Every action cryptographically sealed with Merkle-tree integrity. Audit trails that satisfy regulators—not just your logging dashboard.

  • Cryptographic execution proofs
  • Immutable action history
  • Compliance evidence on demand
VERIFICATION_FLOW

How it works

Every interaction—agents, tools, APIs, resources—verified and enforced.

01

Verify

Cryptographic identity for every interaction—agents, APIs, tools, and resources.

02

Decide

Trust score + policy gate. Allow, warn, or block in under 100ms.

03

Enforce

Approved actions proceed. Unauthorized requests blocked before execution.

04

Audit

Merkle-tree proofs for every decision. Tamper-proof and compliance-ready.

Every interaction is cryptographically signed and creates a tamper-proof audit trail. Blocked actions never execute. Every decision is verifiable.

LIVE_PROTOCOL_DEMO

See Tessorium in action

Identity, trust, policy, audit—all in real-time.

tessorium-demo

Tap to pause

Click terminal to pause • 5 phases demonstrating full protocol

EXECUTION_TRACE_REPORTER

When you need the logs,
they'll be bulletproof.

Every interaction is recorded as a cryptographic hash in a Merkle tree. RFC 9162 consistency proofs (the same standard used by Certificate Transparency) mean you can prove nothing was modified—ever. Hand this to your auditor and be done in minutes, not weeks.

01

Immutable History

Once recorded, entries cannot be altered or deleted

02

Efficient Verification

Verify any action in milliseconds

03

Compliance Ready

Export-ready for SOC 2, HIPAA, GDPR, and EU AI Act audits

MERKLE_TREE_VIEWER
ROOT_HASH
0x7b4f...8a2d
H1
e5a7...
H2
f9c3...
Agent Init
a7f3...
Auth Check
b2e9...
API Call
c4d1...
Data Read
d8f2...
SUCCESS
BLOCKED
HOVER_PATH

↑ Hover over nodes to trace the hash path to root

DEPLOYMENT_OPTIONS

Choose the path that fits your stage

From prototype to regulated enterprise—pick your path.

RECOMMENDED

Enterprise

FULL_SERVICE

Stop worrying about rogue agents. We handle everything: architecture review, TTP integration, SPL policy design, and EU AI Act compliance. Prevention built-in from day one.

BEST_FOR: REGULATED INDUSTRIES & EU AI ACT
  • Human-in-the-loop controls with instant revocation
  • EU AI Act Article 14 compliant
  • Custom SPL policy engineering
  • Tamper-proof audit evidence
  • Dedicated success team
BOOK_CONSULTATION

TTP Protocol

FREE_&_OPEN_SOURCE

Build directly on the protocol. Perfect for researchers, protocol-first builders, and community contributors who want to experiment or integrate TTP into their own stack.

BEST_FOR: RESEARCHERS & BUILDERS
  • Full SDK access
  • Cryptographic DIDs
  • Self-hosted deployment
  • Active GitHub community
VIEW_GITHUB

<100ms

Trust Decisions

Ed25519

Cryptographic Identity

RFC 9162

Audit Standard

PROTOCOL_SPECS

Compliance by Design

EU AI ActSOC 2HIPAAGDPR

Built for EU AI Act Article 14 human oversight requirements. Human-in-the-loop controls, kill switches, and tamper-proof audit trails.

HOW_WE_WORK

From discovery to deployment

A clear process. A dedicated team.

Audit-ready in 30 days
01

Discovery

We map your agents, data flows, and risk surface. Full inventory and compliance gap analysis.

02

Integration

We deploy TTP, configure SPL policies, and enable kill switches. Prevention from day one.

03

Ongoing

Real-time blocking, instant revocation, and audit evidence on demand.

We integrate with your AI agent infrastructure—whatever framework you use. No code changes required on your end.

Stop talking about AI trust.
Start enforcing it.

Tessorium is the Let's Encrypt moment for AI agents. Open protocol. Enterprise-ready. Audit-ready in 30 days.