Set up AI agent governance for your organization. No engineering degree required.
This guide is for you if your title includes words like Compliance, Risk, Audit, or Governance and someone just told you the company is deploying AI agents. You need to know what LockStock does, how to set it up, and what to tell the regulators.
You do not need to write code. You do need a web browser and about 30 minutes.
LockStock creates an immutable, cryptographic audit trail for every action your AI agents take. Think of it as a tamper-evident flight recorder: every prompt sent, every response received, every tool invoked — all logged in a hash chain that cannot be rewritten after the fact.
When a regulator asks "how do you know what your AI did on Tuesday at 3pm?", the answer is: "We have a mathematically verifiable record. Here's the proof."
What just happened: You created a tenant account. All agents you register will belong to this account, and all audit logs will be scoped to you. No one else can see your data.
For each AI agent your organization runs, you'll create a registration in the dashboard:
customer-support-bot, document-classifier)Important:
The genesis token expires in 24 hours and can only be used once. If it expires before your engineering team uses it, simply delete the agent and create a new one. This is a security feature, not a bug.
Send the genesis token and agent name to whoever manages the AI agent's infrastructure. They will use it in Step 4. You do not need to do Step 4 yourself (but you can if you want to).
Send your engineering team this message (copy and paste is fine):
We need to add LockStock audit logging to [AGENT NAME].
Here's what you need:
- Gateway Key: [I'll send separately via secure channel]
- Account Key: [I'll send separately via secure channel]
Run one Docker container:
docker run -d --name d3cipher-gateway \
-e D3CIPHER_API_KEY=[gateway key] \
-e UPSTREAM_URL=https://api.openai.com \
-e ACCOUNT_KEY=[account key] \
-p 4000:4000 \
registry.gitlab.com/d3cipher/lockstock-images/gateway:v3.1.0
Then change one env var on each agent:
OPENAI_BASE_URL=http://gateway-host:4000
Full guide: https://d3cipher.ai/docs-gateway-quickstart.html
No code changes. Should take about 20 minutes.
That's it. The engineering work is a configuration change, not a rewrite.
You don't have to do this step. This is what happens on the engineering side, so you know what to expect:
# Point agents at the gateway instead of directly at OpenAI OPENAI_BASE_URL=http://gateway-host:4000
X-D3cipher-Agent: agent-nameZero code changes to the agent itself. The d3cipher Gateway sits between the agent and the AI provider (OpenAI, Anthropic, etc.) as a reverse proxy. The agent doesn't know it's being audited.
Once engineering confirms the agent is running with LockStock:
If you see entries appearing, congratulations: you have a working audit trail.
Set up your Account Key for encrypted transcript access:
Why this matters: Transcripts are encrypted end-to-end. The LockStock server stores the ciphertext but cannot read it. Only someone with your Account Key can decrypt agent transcripts. This is how you prove to auditors that even your vendor cannot access your AI conversations.
When regulators ask about your AI governance framework, here's what you have:
Every AI agent action is logged in a cryptographic hash chain. Each entry is linked to the previous one. Tampering with any entry breaks the chain and is immediately detectable. This is not a database log that someone with admin access can edit — it's a mathematical proof of sequence.
Full transcripts (prompts and responses) are encrypted before they leave your infrastructure. The audit service stores ciphertext it cannot decrypt. Decryption requires your Account Key, which only your team possesses. Your vendor cannot read your AI conversations.
LockStock monitors agent behavior for anomalies: unusual request velocity, unexpected task types, sequence gaps. A circuit breaker can automatically halt an agent that exceeds defined thresholds. You can enable or disable ML-based anomaly scoring per tenant from the dashboard Settings.
Each agent has a unique cryptographic identity derived from its hash chain. Agents are authorized for specific task types only. An agent authorized for "customer support" cannot suddenly start executing "financial trades" — the system will reject the action and log the attempt.
Transparency matters. Here's what falls outside LockStock's scope: