A category, and a layer

Agent Audit and Management.

Every industry adopting AI agents will need a cryptographic record of what those agents actually did — admissible after the fact, verifiable without trusting the vendor. Bonis Systems operates a vendor-neutral audit-permanence layer that sits above any control plane, any agent runtime, and any orchestration framework.

Vendor-neutralAbove any control planeBitcoin-anchoredFRE 902(13)/(14) architectural fitPost-quantum (ML-DSA-87)Defensive only

Disambiguation

AAM is not safety, not alignment, not observability, not MLOps.

Each of these disciplines answers a different question. AAM answers the one that arrives last and stays the longest: what did the agent actually do, and is the record still verifiable years from now.

AI Safety asks
What is the agent permitted to attempt?
AAM produces
A tamper-evident record of what it actually did, attempted or otherwise.
AI Alignment asks
What does the agent choose to do, and is that aligned with intent?
AAM produces
An after-the-fact record that survives the agent, the operator, and the vendor.
AI Observability asks
What is the agent doing right now, in real time?
AAM produces
A long-tail evidentiary record — admissible to a court a decade later.
MLOps / AgentOps asks
How is the agent built, deployed, and monitored?
AAM produces
What did the deployed agent commit to, on the record, that a third party can verify.

AAM is downstream of safety and alignment, adjacent to observability, and orthogonal to MLOps. A mature stack will run all of them. They do not replace each other.


AAM lanes

One primitive, many operational seams.

The same Knox audit-permanence layer treats different classes of agent action as discrete event taxonomies. Each lane below maps the primitive onto a specific operational seam — with its own anchors, its own FAQ, and its own worked examples.

Lane · Architecture map

Three-Layer Agent Architecture

Three layers, three customer types, one cryptographic spine. Layer 1 (AAM, audit-permanence) + Layer 2 (AI Production Discipline) + Layer 3 (Continuity & Adversarial Resilience). The map of where Bonis Systems operates across the agent stack.

Lane · Layer 2

AI Production Discipline

Pre-deploy methodology that catches the defect before it ships — so the audit layer never has to memorialize a fault. Six primitives: Truth Protocol three-source, multi-pass measurement, Stop-and-Save Rule, Coachbuilt floor, Stealth Posture, Evidence Ledger.

Lane · Layer 3

Continuity & Adversarial Resilience

What survives when the world breaks. Evidence generator (Knox Edge Anchor) and identity generator (HSM/TPM-bound PQC) preserve the chain when the network drops, infrastructure fails, or an adversary takes a swing. Anchor primitives and PQC stack shipped; Edge Anchor and HSM binding in active scope.

Lane

Agent Memory

Every memory write, read, edit, redaction, export, and policy change becomes a Bitcoin-anchored, court-admissible event. Vendor-neutral, above any memory store.

Lane

Agent Transactions

Every offer, acceptance, settlement, dispute, and reversal becomes a tamper-evident commitment record. Vendor-neutral, above any marketplace or payment rail.

Lane · Compatibility

Control-Plane Compatibility

A control plane authorizes what agents may attempt. AAM records what they actually did. Knox composes above any control plane — Microsoft Agent 365, Rubrik Agent Govern, AWS Bedrock, Vertex AI, in-house — without coupling.

Lane · Compatibility

Model Context Protocol

An open spec for tool calls, met by an open chain for the record. Tool calls, resource fetches, and prompt invocations through any MCP server become tamper-evident anchors — without modifying the server itself.

Lane · Live

Knox Anchor MCP Server

The audit-permanence layer, exposed as typed MCP tools any compatible agent runtime can call. Streamable HTTP transport. Seven tools. Stateless. The MCP envelope over the live Knox primitive — no second chain, no second key system.

Lane · Federal

GSAR 552.239-7001

A public mapping of GSA's draft AI safeguarding clause to Knox primitives — American AI eligibility, 72-hour CISA reporting, eyes-off data handling, traceability, 90-day artifact preservation. Architecture, not advocacy.

Lane · Theater

Automotive AI Agent Audit

Every vehicle shipping AI driving assistance logs telemetry internally; the manufacturer owns the only copy. Driver-vs-AI blame is structurally unresolvable when the entity whose AI may have caused the crash is the sole custodian of evidence. Vendor-neutral, Bitcoin-anchored, court-admissible architecture.

Lane · Theater

Payments AI Agent Audit

Every transaction passing through a payment gateway flows through code the merchant cannot independently verify at the moment of execution. PCI-DSS audits configuration, not per-transaction code-and-data integrity. Vendor-neutral cryptographic audit-permanence above any payment gateway.

Lane · Reference

Knox Event Taxonomy

Public reference for the 98 canonical Knox event types — the audit-permanence schema under every AAM record. Sourced from src/lib/knox-anchor.ts, mirrored at /bonis/agent-feed.json, and reproducible by an outside party without contacting Bonis Systems.

Lane · Standards

AITH Protocol Alignment

AITH (AI Trust Handshake, arXiv:2604.07695) is a published post-quantum continuous delegation protocol — how an agent is granted, bounded, and revoked. Knox is the cryptographic audit-permanence layer that records what the bounded agent then did. Same primitives — ML-DSA-87 (NIST FIPS 204) and SHA-256 — complementary layers, formally-verified on both sides.


The category

Every industry × every agent × every action.

Healthcare, financial services, government, energy, legal, commerce — agents are entering every operational seam. Each agent action is a state change with consequences: a transaction initiated, a record updated, a contract executed, a document generated, a refund issued, a privilege asserted. None of those actions is self-authenticating by default.

AAM is the post-deployment evidence layer that closes the gap. It is downstream of AI safety (which constrains what agents are permitted to attempt) and AI alignment (which shapes what agents choose to do), and adjacent to AI observability (which describes what agents are doing right now). AAM is the long-tail record: what did the agent do, when, with what inputs, against what policy, and is the record still verifiable in ten years.

The same answer must hold whether the question arrives from an internal auditor, a regulator, a court, an insurance carrier, a counter-party, or a future operator who has never met the people who deployed the agent.


The architecture

One primitive, several layers, zero proprietary lock-in.

Bonis built AAM the way NVIDIA built guardrails for open-source AI: as the trust layer above a heterogeneous ecosystem, not as a competing control surface. The primitives below are the already-shipping mechanics of the layer.


Vendor neutrality

Above any control plane.

A control plane authorizes what an agent may attempt. An identity provider authenticates who an agent is. A runtime executes the agent. A framework orchestrates the agent's calls. Each is a layer that may be vendor-specific.

AAM, as Bonis runs it, sits above all of those — receiving structured action records from any of them, hashing them client-side or server-side, and anchoring them to a public chain. The audit layer is independent of who authorized the action and who executed it. That independence is the property that makes the record useful to a regulator, a court, or a counter-party.

Concretely: a Bonis anchor for an agent action originating inside Vendor A's control plane is verifiable using the same Bitcoin tooling as an anchor for an agent action originating inside Vendor B's. The customer never has to choose between the audit layer and the control plane they prefer.


Standards alignment

Open specs, public chain.

Post-quantum cryptography

NIST FIPS 204 (ML-DSA / Dilithium) and FIPS 205 (SLH-DSA / SPHINCS+) shipped on Knox Agent #11 Layer 4. ML-DSA-87 is the highest-strength parameter set and is the same primitive cited in academic agent-trust specifications.

@noble/post-quantum · 6 parameter sets · live

Public-chain anchoring

OpenTimestamps protocol over Bitcoin. The proof is portable — any third party with an OpenTimestamps client and a Bitcoin full node can verify any Bonis anchor without Bonis being in the loop.

opentimestamps.org · Bitcoin · independent

Federal Rules of Evidence

Anchors and the affidavits derived from them are architected to meet the self-authentication requirements of FRE 902(13) and 902(14). Admissibility in any given matter is determined by the presiding court.

FRE 902(13) · 902(14) · architectural fit

Formal methods

The anchor pipeline has a TLA+ specification of its hash-link, sequence-monotonicity, and Merkle-root invariants. The spec is public, the source is public, the verifier is public.

TLA+ · /bonis/spec · public source

Defensive-only doctrine

Evidence layer, not enforcement.

Bonis Systems operates as the evidence layer beneath law enforcement, regulators, and courts — never as a substitute for them. The doctrine is binding across every Knox agent and every external action.

Permitted

  • Defensive perimeter measures (rate limits, blocklists, abuse detection on Bonis-owned surfaces).
  • Evidence-layer escalation to platform owners.
  • Reporting to federal law enforcement, regulators, and courts.
  • Public disclosure of architectural facts already on-chain.

Prohibited absolutely

  • Hacking, denial of service, compromise, or sabotage of any external system.
  • Active counter-attack, even against provably adversarial agents.
  • Pretextual access, identity spoofing, or unauthorized scraping.
  • Any action a court would not bless if read out loud at trial.


USPTO provisional applications, inventor of record Jonis Aaron Fields: 64/038,359 (Knox · 2026-04-13), 64/012,440 (TerraVault · 2026-03-21), 64/036,498 (TrustAI · 2026-04-11), 64/002,221 (HealthAgent · 2026-03-11), 64/013,240 (DealMatcher · 2026-03-22). Provisionals are priority-date footnotes; the operating moat is shipping code, public anchors, and open-standard alignment. Bonis Systems LLC · UEI R2BPJDC5CBA3 · CAGE 1TSP2.