Deterministic Control for Non-Deterministic AI
Traditional SIEMs watch the clock. We watch the chain of custody.
LockStock Guard is an enterprise-grade security layer that provides real-time monitoring, anomaly detection, and causal auditing for autonomous AI agents. Unlike traditional security tools that rely on timestamps and log correlation, Guard uses cryptographic proof and topology analysis to create an immutable record of agent behavior.
Traditional logs tell you when something happened. Guard proves why it happened by creating an unbreakable cryptographic chain linking every action to its cause.
Every agent action is cryptographically chained to its predecessor using parent hash references. This creates a directed acyclic graph (DAG) where:
# Traditional Log Entry (Can be spoofed)
[2026-01-15 14:32:01] Agent A: TRANSFER_FUNDS($10,000)
# LockStock Guard Audit Entry (Cryptographically Proven)
{
"sequence": 45,
"agent_id": "production-agent-001",
"task": "TRANSFER_FUNDS",
"parent_hash": "a7f3c2d1b9e8f4a6...",
"hash": "3d9e4f2c8b7a1f5d...",
"server_timestamp": "2026-01-15T14:32:01.234Z",
"causal_chain": [
"USER_PROMPT: Process monthly payroll",
"SUB_AGENT: AUTHENTICATE_USER",
"SUB_AGENT: VERIFY_BALANCE",
"SUB_AGENT: TRANSFER_FUNDS" ← We are here
]
}
AI agents can hallucinate. When they do, they don't just make a mistake—they make mistakes at the speed of light. A rogue agent might execute 1,000 erroneous database writes before a human can react.
Guard monitors the rate at which agents transition between states (Δseq/Δtime). It establishes a baseline for normal operation and triggers alerts when velocity exceeds safe thresholds.
| Metric | Normal Baseline | Warning Threshold | Critical Threshold |
|---|---|---|---|
| State Transitions/sec | 2-5 per second | 30 per second | 50 per second |
| API Calls/min | 10-20 per minute | 100 per minute | 200 per minute |
| Database Writes/sec | 1-3 per second | 20 per second | 40 per second |
When velocity exceeds critical thresholds, Guard automatically trips a circuit breaker:
Instead of text-based logs, Guard displays a visual topology graph showing the "family tree" of agent decisions. This lets you trace any transaction back through sub-agents to the original user prompt.
The Guard Dashboard renders a hierarchical graph where:
Click any node to see its complete lineage. For example, clicking on a TRANSFER_FUNDS operation reveals:
USER_PROMPT: "Process monthly payroll" (Seq: 0)
↳ SUB-AGENT: AUTHENTICATE_USER (Seq: 1)
↳ SUB-SUB-AGENT: VERIFY_2FA_TOKEN (Seq: 2)
↳ SUB-AGENT: LOAD_PAYROLL_CONFIG (Seq: 3)
↳ SUB-AGENT: VERIFY_ACCOUNT_BALANCE (Seq: 4)
↳ SUB-SUB-AGENT: QUERY_BANK_API (Seq: 5)
↳ SUB-AGENT: TRANSFER_FUNDS (Seq: 6) ← You are here
LockStock Guard deploys as a lightweight sidecar container that intercepts agent operations without modifying your existing infrastructure.
Guard adds less than 5ms of latency per operation. Cryptographic verification happens asynchronously, so your agents don't wait.
Integrate via environment variables and SDK initialization. No modifications to your agent logic required.
Each agent gets its own Guard sidecar. Scale to thousands of agents without performance degradation.
Works with AWS ECS, Kubernetes, Google Cloud Run, or any container orchestration platform.
# Docker Compose Example
version: '3.8'
services:
my-ai-agent:
image: mycompany/ai-agent:latest
environment:
- LOCKSTOCK_ENABLED=true
- LOCKSTOCK_AGENT_ID=production-agent-001
depends_on:
- lockstock-guard
lockstock-guard:
image: d3cipher/lockstock-guard:latest
environment:
- GUARD_MODE=enterprise
- VELOCITY_THRESHOLD=50
- DASHBOARD_PORT=8080
ports:
- "8080:8080" # Dashboard access
LockStock Guard is designed to meet the most stringent regulatory requirements for AI systems handling sensitive data.
Compliance frameworks like SOC2 and PCI-DSS require regular credential rotation. Most systems rotate every 30-90 days, creating windows where compromised credentials remain valid.
LockStock eliminates this gap entirely.
What This Means For Your Audit:
LockStock Guard uses tiered pricing designed to scale with your deployment from growing teams to enterprise-scale operations.
| Plan | Price | Agents | Audit Retention | Support |
|---|---|---|---|---|
| Professional | $999/month | Up to 50 | 1 year | Priority |
| Enterprise | $2,499/month | Up to 250 | 7 years | Dedicated + SLA |
| Enterprise Scale | Custom | 250+ | 7 years | White-glove |