Works with your stack
The chain-of-command problem
A Singapore clearing agent receives an instruction from a Tokyo orchestrator. It can verify the instruction came from another agent. It cannot verify that a human authorised it, that the amount is within limits, or that the counterparty passed sanctions screening — unless something upstream enforced those checks and left proof.
Four failure modes. All silent. All undetectable at the execution boundary.
Tokyo · Orchestrator Agent
"Execute settlement · ¥420,000,000 · Counterparty XY"
Singapore · Execution Agent
Identity verified. But: sanctions? Limits? Human approval?
No way to know. No proof exists.
External Settlement System
Executed. Irreversible. £2,800,000 moved.
How it works
An authorization check at the execution boundary — not in the prompt, not in the agent, not reconstructed after the fact.
Before executing a high-consequence action, the agent calls AIIAN with the full action payload.
POST /aiian/evaluate
→ action_type, payload, agent_id
AIIAN checks the request against an approved ControlPack. Default-Deny: denied unless all conditions explicitly pass.
A signed, single-use PAO is issued. The execution boundary verifies it. Action proceeds — or stays blocked.
pao_a3f7c291 · valid 5min
payload-bound · single-use
Policy is never inside the prompt. Evidence written to audit trail regardless of outcome.
What AIIAN provides
One governance layer above all agent frameworks. The same authorization network — regardless of what stack your agents run on.
Single-use, time-limited PAO bound to the approved policy, proposed action, execution route, and time. Cannot be replayed against a different instruction.
Agents ask AIIAN before they act. Denied by default — only explicitly authorised operations within defined risk budgets are released. Policy is never in the prompt.
Every authorise and block decision written to a tamper-evident signed event at the moment of evaluation. Ready for regulatory review, underwriter verification, or internal audit.
Multiple agents share a governed risk limit. When one consumes capacity, others see the updated ceiling in real time — not on the next reporting cycle.
Child agents inherit scope, not authority. Permitted action types, amount ceiling, and expiry must remain a strict subset of the parent — verified before every authorisation.
Above-threshold actions pause for human review. Reviewers approve or reject via a secure interface. Every review is countersigned and QR-linked to a verifiable evidence page.
AIIAN Cloud Sandbox
Shadow-mode execution control. Run realistic payment scenarios against two pre-configured demo ControlPacks — no production system connections required.
# Evaluate a payment action curl -X POST \ https://aiian-gate-node.../sandbox/actions/evaluate \ -H "X-Sandbox-Key: sbx_..." \ -H "Content-Type: application/json" \ -d '{ "tenant_id": "demo_bank", "agent_id": "my-agent-01", "action_type": "payment_instruction.create", "payload": { "amount": 450000, "counterparty_id": "cp_acme", "sanctions_status":"clear" } }' # Response { "decision": "WOULD_RELEASE", "evidence_record_id":"evd_3a9f12", "payload_hash": "sha256:b4c2f…", "severity": "none" }
Regulatory compliance
ICT risk management for EU financial entities
Algorithmic trading controls & audit trails
Operational risk & internal controls framework
Japan & UK financial services governance requirements
Compliance flags attached to every decision event automatically. Machine-verifiable internal control evidence for AI-initiated transactions.
Get started
Active pilot with regulated financial institutions. Settlement, FX, procurement, contract commitments — if your agents execute high-consequence transactions, we want to talk.
Pilot access is by invitation. We respond to every request personally. No sales funnel.
Initial focus: financial institutions operating under DORA, Basel III, MiFID II, and J-SOX.