Verifier → Permit → Fail‑Closed Gateways
One‑line: Agents stay blocked from real actions (egress / device I/O / accelerator dispatch) until they present a verifiable, scoped, expiring permit — with audit‑ready receipts.
Model output becomes action
Agentic systems introduce a new failure mode: “allow by default” paths appear under drift, misconfig, or bypass. NOVACOV is built for pre‑action control, not post‑hoc storytelling.
No permit, no side effect
Missing/stale/unverifiable prerequisites deterministically map to HOLD/QUARANTINE/DENY and block the action — enforced at chokepoints designed to be non‑bypassable.
Architecture (3 control primitives)
Simple to explain. Hard to bypass.
Freshness + inclusion + consistency
Runtime validates that the committed deployment logic is included under a current signed head and that the log evolved append‑only.
Mint only after PASS
On PASS, mint a short‑lived permit bound to audience (agent/tenant/mission), record a receipt, and require it at execution time.
Enforce at chokepoints
Gateways require a valid permit identifier before network egress, device I/O, or accelerator dispatch — otherwise fail closed.
Where enforcement lives
Non‑bypassable chokepoints. Pick one for a pilot.
- Kernel egress / dispatch intercept (syscall paths, cgroups/eBPF, network gateways)
- Driver path (queue/doorbell before device or accelerator action)
- Firmware / microcode (before dispatch)
- Hypervisor intercept (VM‑exit / egress gateway)
- Fail‑closed default: missing permit → DENY
- Revocation overrides allow (immediate + provable)
- TTL enforced (short‑lived permits)
- Bypass attempts (loopback/proxy) deterministically denied
The 60‑second proof
What we show in the meeting — optimized to earn the security‑attended deep dive.
Meeting outputs
A short report plus machine‑readable receipts (e.g., JSONL) and readable deny reasons — designed for Security review.
Design partner offer (6–12 weeks)
Start with one gateway. Prove non‑bypassable control + receipts. Expand after.
Align on scope
- Threat model + highest‑risk action surface
- Evidence schema + reason codes + acceptance tests
Sandbox proof
- Verifier MVP integration
- Permit‑before‑egress (or dispatch) + receipts export
Hardening plan
- Move enforcement deeper (driver/firmware/hypervisor)
- Production hardening backlog + pilot‑to‑prod option