Vigil is infrastructure that makes AI agents accountable. Cryptographic audit trails, real-time enforcement, and automated damage recovery — across every AI provider your enterprise uses.
Vigil intercepts every AI API call in real time. It decomposes semantics, runs 8-layer anomaly detection, enforces your policy rules, and writes a tamper-evident audit log — before the response reaches the user.
Vigil writes every AI interaction to a VOAF-format audit trail. Each record is SHA-256 hashed and chain-linked to the previous entry. The chain is verifiable and tamper-evident. Click any record to inspect it.
When an agent behaves outside its authorized scope — or when you simply decide to stop it — Vigil revokes all active sessions, OAuth tokens, and API credentials atomically. No partial state. No lingering access.
When Vigil detects a policy violation after the fact, REPAIR mode reconstructs what the agent did and reverses it. OAuth tokens revoked. Transactions cancelled. Evidence packaged for legal or insurance use.
AI agents with portfolio access, trading authority, and payment execution need cryptographic accountability. A compromised financial agent is an existential event. Vigil provides the kill switch, rollback, and evidence trail that institutional risk desks require.
Law firms and compliance teams deploying AI for research, contract drafting, and regulatory filing need proof of what the AI produced and what data it accessed. Vigil's VOAF trail is court-admissible and jurisdiction-aware.
Embed Vigil into your product as an accountability layer for policyholders using AI agents. The audit trail becomes a claims defense asset. The kill switch becomes a product differentiator. One API integration. Per-seat pricing.
Agents executing on-chain transactions operate with zero human oversight. Vigil enforces authorization boundaries, flags anomalous transaction patterns, and revokes signing authority before damage compounds. Compatible with existing wallet infrastructure.
Start with prevention. Add recovery. Add persistence. Add offense. Each mode builds on the last. Your subscription tier determines which modes activate.
Pre-request blocking gate. Runs synchronously under 50ms. 8 detection layers. Stops threats before they reach your AI.
Post-incident recovery. Rolls back agent actions, revokes tokens, cancels transactions, and generates signed evidence packages.
Persistent threat monitoring. Adversary fingerprinting. Behavioral drift detection. Legal pipeline automation. Runs continuously in background.
Offensive countermeasures. Active adversary disruption. Network-scale collective defense using aggregated threat signatures from across the Vigil deployment base.
Vigil submitted a formal response to NIST Docket 2025-0035 on AI accountability infrastructure. Comment tracking number: mmk-190r-hvap.
Vigil's architecture aligns with IMDA's Model AI Governance Framework for agentic AI. SHIELD, REPAIR, and SENTINEL map directly to the framework's accountability requirements.
Automated regulatory report generation for three jurisdictions. VOAF export format is readable by third-party auditors without proprietary tooling.
An open standard for AI agent audit logs. Published as a standalone spec at github.com/vigilsec/voaf-spec. Not tied to Vigil's product code.
Protocol for cryptographic attestation of AI agent authority grants. Enables verifiable "the human authorized this" assertions that survive audit.
Open protocol for cross-system agent authority revocation. Enables kill switch propagation across third-party systems and smart contracts.
Open standards published independently at vigilsec.ai — not tied to Vigil product code.
Vigil's Partner API lets you offer your users cryptographic AI audit trails, kill switch controls, and behavioral monitoring as a native feature of your platform. One integration. Per-seat pricing. Full white-label.
# Wrap any AI client in one line from vigil_sdk import VIgilClient # OpenAI — drop-in replacement client = VIgilClient( api_key="your-vigil-key", underlying="openai", policy="strict" ) # Every call is now monitored response = client.chat.completions.create( model="gpt-4o", messages=[{"role": "user", "content": prompt}] ) # Access the audit trail audit = client.audit.export_voaf( format="signed", jurisdiction="sg-mas-trm" )
# POST /v1/partner/users/enroll { "user_id": "your-platform-user-id", "email": "user@yourplatform.com", "tier": "fortress", "policy": "financial-services-strict" } # Response: signed license key + audit endpoint { "license_key": "vig_live_...", "audit_url": "https://vigil-cloud.fly.dev/...", "modes": ["shield", "repair"] }
You don't send them to runvigil.ai. The accountability layer lives inside your product, branded as yours. Vigil is the infrastructure.
Self-serve signup for Guardian, Fortress, and Citadel. Enterprise and partner integrations get a response within 24 hours.
No single AI provider can solve this. It requires a cross-provider infrastructure layer. That is what Vigil is.