Identity is the Sum of History
Enterprise Security for Autonomous AI
Accelerate audit readiness. Demonstrate continuous compliance. Add measurable value to the bottom line. LockStock provides zero-replay security with per-action credential rotation, cryptographic proof, and tamper-evident audit trails that meet SOC2, HIPAA, and PCI-DSS requirements.
Our Products
From stateless drifters to verifiable agents
LockStock Guard
"Your Logs Show When. We Show Why."
For Teams, CISOs, and Compliance
Multi-agent security platform with extended retention and compliance features. From 10 to 500+ agents with audit trails from 90 days to 7 years.
- [OK] Multiple agent support (10 to 500+)
- [OK] Extended retention (90 days to 7 years)
- [OK] SOC2/HIPAA/ISO27001 compliance exports
- [OK] Real-time anomaly detection
- [OK] Team access and role management
- [OK] Priority and dedicated support
LockStock Core
"Give Your AI a Soul, Not Just a Session ID"
For Individual Developers
Complete single-agent solution with 30-day retention. Cryptographic identity, web dashboard, and community support.
- [OK] 1 agent with cryptographic passport
- [OK] 30-day audit log retention
- [OK] Web dashboard and monitoring
- [OK] Agent teleportation and memory
- [OK] Python/Rust SDKs
- [OK] 14-day free trial
Liberty
"Open Source. No Strings Attached."
For Individual Developers
Hardware-bound secrets manager with zero configuration. Secrets encrypted using your hardware fingerprint—no master passwords, no key management, just works.
- [OK] Hardware-bound encryption (software PUF)
- [OK] AES-GCM authenticated encryption
- [OK] Zero configuration required
- [OK] CLI interface for everyday use
- [OK] Environment injection for secrets
- [OK] Complete audit logging
Enterprise-Grade Security Built In
Continuous compliance, zero replay windows, mathematical proof
Cryptographic Identity
"Identity is not a label; it is the sum of a complete history."
In traditional systems, an agent's ID is just a string in a database column—easily spoofed or duplicated. In LockStock, an agent's identity is intrinsic to its data structure.
The Passport Mechanism: Every agent is issued a cryptographic "passport"—a dynamic object signed with HMAC-SHA256. Every action is verified against the agent's public key.
Tamper-Proofing: Without the private signing key held in the secure enclave, a "clone" is instantly rejected as a forgery.
Cryptographic State Evolution
"Every action creates an unforgeable mathematical proof of correctness."
We moved beyond simple version numbers (v1, v2, v3) to cryptographic state evolution. Each state change creates a mathematically-linked proof that prevents state collisions in distributed systems.
Why Order Matters: The cryptography ensures sequence integrity. You cannot rearrange an agent's history, insert fake actions, or create duplicate states. Order is mathematically enforced.
The Benefit: We can mathematically prove lineage and calculate exactly how many steps apart any two states are. This makes "forking" an agent's identity mathematically impossible and enables automatic credential rotation on every action.
Parent Hash Chain
"Unforgeable cryptographic lineage. One-time use per state."
LockStock treats agent states like blocks in a blockchain, but optimized for high-frequency updates.
The Chain: Every new state Sn must contain the SHA-256 hash of the previous state Sn-1. This creates an unbreakable chain back to the agent's genesis.
Replay Attack Prevention: Once a state hash is "spent" to create a new state, it cannot be used again. The chain is strictly forward-moving.
Per-Action Credential Rotation
"Zero-second replay window. Continuous compliance."
Traditional systems rotate credentials every 30-90 days, creating exposure windows where stolen credentials remain valid. LockStock rotates cryptographic proof on every single action.
Business Impact: Demonstrate lower risk posture with zero replay windows. Accelerate SOC2/HIPAA audits by proving continuous rotation instead of scheduled 90-day changes. Industry benchmarks show audit cycle time reduced by 60-70% with automated compliance evidence.
The Difference: Stolen credentials from action N cannot authenticate action N+1. Compare this to traditional systems where the same API key works for months. Every action uses a credential that has never existed before and will never be valid again.
Velocity Monitoring
"Detect the rogue agent before the damage."
Agents operating at machine speed can spiral out of control in milliseconds. We embed physics-like constraints into the execution environment.
The Metric: The server constantly calculates Δsequence / Δtime. It measures not just how much the agent is doing, but the acceleration of its state changes.
Containment: If threshold exceeded (e.g., 50 state transitions per second), the agent is frozen in read-only state. This prevents "infinite loop" hallucinations or malicious attacks.
Causal Audit Trail
"Mathematical non-repudiation. No clocks required."
Distributed systems suffer from "clock drift"—when servers disagree on time, logs become useless. We solved this by removing wall-clock time from the equation.
Logical Clocks: We rely on Lamport Timestamps (logical sequence numbers). Event B follows Event A because Event B contains the hash of Event A.
Non-Repudiation: An agent cannot deny an action it took, because that action is a necessary mathematical predecessor to its current state. To deny the past is to invalidate the present.
Agent Teleportation
"Export passport → migrate to new host → import → resume at exact sequence."
True portability means the agent is independent of the hardware it runs on.
Serialization: LockStock serializes the entire Topological State and Hash Chain into a portable binary blob. The destination server validates the passport and hash chain integrity.
Zero-Loss Resume: The agent "wakes up" on the new server with memory, goals, and context perfectly intact. This enables Edge-to-Cloud and Cloud-to-Cloud mobility without custom ETL pipelines.
