Altrace governs what your agents are authorized to do — and enforces it. At the network layer in Kubernetes. At the credential layer everywhere else. Every decision recorded, every delegation contract enforced, every violation surfaced immediately.
Architecture
In Kubernetes, agents have no route around governance — traffic is forced through the sidecar at the network level. In all environments, credential-based enforcement governs LLM access. Both paths feed the same control plane: same kill switch, same audit trail, same delegation contracts.
Capability
In Kubernetes deployments, the kill switch blocks new LLM requests within 1 millisecond and terminates active tunnels within 1.2 seconds. Kill state persists through restarts and power loss. Maximum cost overrun is bounded to $100 regardless of agent behavior.
The kill switch operates at three granularities: global (all agents), team (all agents in a team), and individual agent. Graduated enforcement escalates automatically through five levels: warning, throttle, quarantine, block, and kill.
Capability
When an orchestrator delegates to a worker agent, Altrace enforces that the worker's authority is a strict subset of what it was granted. Budget limits, model access, tool permissions, data classification, time windows, rate limits, and geographic constraints — all governed by cryptographically signed delegation contracts.
This isn't policy-enforced. It's mathematically enforced. Authority attenuation makes escalation structurally impossible, not just prohibited.
Capability
Altrace records every enforcement decision in a tamper-evident audit log. Request ID, agent identity, the specific stage in the 14-stage decision chain that produced the result, delegation contract reference, and machine-readable reason code — all signed and stored.
When an auditor asks what happened, you don't search through prompt logs. You have causal records: which agent, what it tried to do, which governance rule was evaluated, and the outcome — with full attribution chain.
Integrations
Deploy as a sidecar in Kubernetes. Connect via credentials anywhere. No SDK changes. No agent code modifications required.