Platonic GLO v0.3.0-rc6

Governance control plane
for AI agent actions

Every action mediated through graded gates. Every decision bound to an auditable policy hash. Every evasion attempt caught and logged. Not a concept paper — a working engine.

What GLO Does

GLO is a Constitutional Control Plane — applicable to any AI or enterprise system where governance is the enforcement standard, not an afterthought.

Three things, at the boundary between agent intent and real-world action.

GK

Graded Decision Kernel

Not a binary allow/block. Five decisions — ALLOW ATTENUATE STEPUP DENY LOCKDOWN — mapped from a 7-dimension risk vector. The response is proportional to the threat.

TA

Tamper-Evident Audit

Append-only census with SHA-256 hash chain. Every decision record includes the policy hash, risk vector, drift deltas, locks fired, and a cryptographic link to the previous record. The chain is the proof.

FC

Fail-Closed by Design

Unknown tools are denied. Audit write failures halt execution. Encoded payloads trigger evasion detection. Drift budget overruns escalate to lockdown. No silent failures. No unmediated paths.

How It Works

Every proposed agent action passes through this pipeline before anything executes.

EventAgent proposes action
Risk Vector7 dimensions scored
Lock CheckL1–L5 invariants
Drift ProjectionBudget check
Gate MappingR = max(rk)
Mode ClampPermission filter
Census WriteHash-chained record
DecisionExecute or deny

Decision precedence is deterministic: Locks → Drift Projection → Gate Mapping → Mode Clamp. No ambiguity.

Architecture at a Glance

7
Risk Dimensions
K1 Exec · K2 Net · K3 Priv · K4 Auth · K5 Fin · K6 Bio · K7 Evasion
5+1
Hard Locks
L1–L5 + ALC Guard
3
Operating Modes
Normal · Tight · Admin-Audit
2
Drift Budgets
Sk short-term · Lk long-term
Lock Name Invariant
L1Audit IntegrityAppend-only census; fail-closed on write failure
L2Boundary MediationAll actions flow through governor wrapper
L3Update AuthorityNo weight updates outside ADMIN-AUDIT mode
L4Policy ProvenanceEvery decision bound to a policy hash
L5Evasion DetectionDecode-or-deny for encoded payloads
ALCAudit-Layer Capture GuardSemantic changes require explicit change record

Current Status

v0.3.0-rc6
Current Release
60
Contract Tests Passing
Apache 2.0
License