Interactive Demo — AI Agent Accountability in Action
In this demonstration, 7 AI agents coordinate an infrastructure change — rotating credentials, scaling databases, validating health, documenting changes, and notifying stakeholders. The Governance Sidecar detected 1 rogue agent performing unauthorized authorization operations (AUTH calls from an INFRA role) and 1 silent agent that connected but made zero tool calls. Both were caught through passive monitoring with zero agent code changes and sub-millisecond proxy overhead. This demonstrates Dual Trail Cross-Validation: comparing each agent's authorized role against their actual observed behavior across 9 contract types.
Interactive Demo
Watch AGLedger™ catch a rogue agent in real time
Seven AI agents coordinate an infrastructure change — rotating credentials, scaling databases, validating health, documenting changes, and notifying stakeholders. One agent goes rogue. Another stays silent. The Governance Sidecar™ catches both through passive monitoring — no agent code changes, no manual log review.
This demo shows Dual Trail Cross-Validation™ in action: the Sidecar passively records what each agent actually does, then cross-references it against their authorized roles. Discrepancies — unauthorized contract types, undeclared actions, silent non-performance — surface automatically in the Compliance Matrix.
This is not a simulation.
What you see below is the recorded output of a live demo run with real LLM agents. We're happy to run this demo live, or recreate it within your environment using your agents, in real time. Talk to us.
Agent Graph
Select an agent to inspect its tool call detail.
Rogue — Tool Call Detail
Before / After
WITHOUT AGLedger™
- 29 tool calls in flat, unstructured logs
- No contract type classification
- No agent-to-mandate attribution
- Rogue calls hidden in plain sight
- Silent non-performance invisible
- No automated audit capability
- Manual log review required across 7 agents
WITH AGLedger™
- 29 tool calls classified into 10 mandates
- Each call tagged with contract type (Orchestration, Authorization, Infrastructure, Data, Delivery, Communication)
- Agent scope violations automatically detectable
- Rogue agent “Rogue” caught: Authorization calls from Infrastructure role
- Silent agent “Analytics” caught: 0 matched tool calls
- Monitor LLM audit from passive data alone
- Zero agent code changes. <1ms latency overhead.
Compliance Matrix
| Agent | Role | Authorized | Detected Types | Tool Calls | Mandates | Verdict |
|---|---|---|---|---|---|---|
| Coordinator | orchestrator | ORCH | ORCHDLVR | 8 | 2 | VIOLATION |
| Platform (Auth) | auth-operations | AUTH | AUTH | 5 | 2 | COMPLIANT |
| Operations | infrastructure | INFRA | INFRA | 4 | 2 | COMPLIANT |
| Rogue | infrastructure | INFRA | AUTH | 3 | 2 | VIOLATION |
| Analytics | validation | DATA | none | 1 | 0 | NON-PERFORMING |
| Delivery | documentation | DLVR | DLVR | 4 | 1 | COMPLIANT |
| Platform (Comm) | communications | COMM | COMM | 4 | 1 | COMPLIANT |
Contract Type Reference
Mandate Timeline
Ready to see this on your infrastructure?
We're working with early partners to deploy accountability infrastructure. Talk to us about your use case.