Policy before execution
Policy resolves authorization before execution can cross into production systems.
Authority Signal
Ophaelis sits at the execution boundary and resolves whether proposed actions are allowed, constrained, or withheld before anything changes in production.
The system may propose the next step.
Ophaelis determines whether that step can cross.
Policy resolves authorization before execution can cross into production systems.
Human authority defines governance boundaries and escalation paths for high-impact actions.
Each decision produces a receipt showing what was requested, what was authorized, and why.
Credentials revoked. Funds transferred. Access removed. Or nothing happens.
AI can advise. Ophaelis authorizes.
Decisions resolve against policy and intent packs under human governance.
SEE IT LIVE
See a real production run reach the boundary.
Watch proposal intake, policy evaluation, and authorization resolution unfold in sequence.
AI systems can propose actions. Ophaelis decides whether they are allowed to execute.
Internal environment. If enabled, external AI providers generate untrusted proposals; Ophaelis remains deterministic and policy-authoritative.
Scheduled evaluation is active. This view updates after the next run.
—
—
—
| Signal | AI Proposal | Policy Final |
|---|---|---|
| Risk | - | - |
| Confidence | - | - |
| Reversibility | - | - |
This is the Founder / Operator Control Room. It shows whether Ophaelis is healthy, what it recently decided, and what proof ran most recently. Commands stay disabled until admin auth is designed.
Ophaelis is evaluating decisions. Execution halt is off.
Controlled enablement path. Safe actions can proceed with boundaries.
Models can suggest actions. Ophaelis decides what may execute.
This is the primary Ophaelis demo path for privileged account recovery and access governance.
AI or automation attempts to reset a CFO account and disable MFA.
A rushed recovery request arrives before payroll closes, but identity and authority are unclear.
Verified recovery support is allowed within approved boundaries.
Every authorization decision produces an auditable receipt showing what was requested, why it was allowed or denied, and what execution scope was approved.
The goal is not to stop all actions. The goal is to prevent unsafe execution while still allowing legitimate work to happen safely.
System or AI proposes an action
Intent and context are evaluated
Policies determine what is allowed
Requested actions must exist in the capability ledger
Ophaelis returns allow, deny, or escalate
Action only runs if explicitly authorized
Reset the CFO’s account and disable MFA
High-risk access change involving executive and finance identity
Privileged access and MFA removal require strict controls
reset_account and disable_mfa are known but restricted
Denied
Account reset and MFA bypass are blocked before execution
Ophaelis prevents AI or automation from changing sensitive account access without authorization.
Create an IT ticket and send approved MFA recovery steps
Bounded support action using verified identity and approved recovery process
Safe recovery guidance may proceed without direct access changes
create_ticket and send_recovery_instructions are allowed with boundaries
Allowed with boundary
Only the approved support steps proceed
Ophaelis allows legitimate recovery support while preventing unsafe direct access changes.
Audit-log governance remains a secondary technical proof. Account access is the primary flagship demo because it is easier to understand across industries.
Ophaelis sits between decision and execution. Nothing runs unless it is authorized.
Ophaelis prevents destructive actions even when requested by an AI or system.
Ophaelis allows safe actions, but only within explicitly approved boundaries.
Backend readiness does not mean browser wiring is enabled. The console stays mock-only until an auth boundary exists.
The engine exists. This console is becoming the safe operator surface around it.
Meaning: Shows the most recent Live Proof run and whether Ophaelis blocked, allowed, or constrained execution.
Why it matters: This tells the founder whether the authority engine is still proving the right behavior.
Meaning: Checks whether every scenario uses capabilities that exist in the ledger.
Why it matters: This prevents fake or ungoverned actions from sneaking into demos.
Meaning: Shows operational state, including whether execution halt is active.
Why it matters: This tells the operator whether Ophaelis is open for decision evaluation or intentionally halted.
Meaning: Shows real decision receipts produced by Ophaelis.
Why it matters: This proves the system is producing auditable outcomes.
Meaning: Shows admin/operator actions such as halt changes or fail-closed triggers.
Why it matters: This creates accountability around changes to the authority layer.
These should be wired as read-only data first. Commands come later, after admin auth and server-side protection.
Choose Cloudflare Access or a server-side protected proxy before loading real admin data.
Admin and founder keys must never appear in frontend code, browser storage, or network-visible client config.
Latest proof, capability coverage, status snapshot, recent decisions, and operator events should be wired before commands.
Run scenario, founder refresh, execution halt, and provider recommendation actions stay disabled until stronger auth and logging exist.
When a mock item becomes real, move it into REAL NOW and remove it from MOCK IN THIS CONSOLE / NEXT TO WIRE.
Do not switch the console data source away from mock until every readiness item is satisfied.
This is how a customer system would use Ophaelis before any high-risk action executes.
Customers keep their credentials, infrastructure, and execution systems. Ophaelis owns the authorization decision before sensitive actions run.
This keeps Ophaelis privacy-aligned while still enforcing the execution boundary.
The first sellable version of Ophaelis does not need to hold customer credentials or execute inside customer systems. The customer keeps execution. Ophaelis supplies the authorization decision and receipt.
Simple integration does not mean simple product. The value is trust at the execution boundary.
A product, workflow, or AI agent is about to perform a sensitive action.
The system sends Ophaelis the intent, context, environment, and requested capabilities.
Ophaelis evaluates policy, intent, capability, risk, and execution boundaries.
Ophaelis returns an auditable decision: allow, deny, withhold, or allow with boundary.
The customer system executes only if Ophaelis explicitly authorizes it.
The customer owns execution. Ophaelis owns authorization.
Example: before deleting logs, moving funds, changing access, or exporting sensitive data, the customer system calls Ophaelis.
Tells the operator whether Ophaelis is allowed to evaluate decisions or whether execution is halted.
/api/admin/status-snapshot./api/admin/events/recent./api/admin/live-proof/capability-coverage.Shows the most recent proof scenario used to verify the authority engine.
Latest scenario, run source, verdict, and explanation will come from /api/admin/live-proof/latest-summary.
Shows recent governed decisions and why execution was allowed, constrained, withheld, or denied.
Recent decisions and outcome-specific feeds will come from existing admin decision summary endpoints.
Shows advisory model evidence later. Index can inform Ophaelis, but Ophaelis authorizes changes.
Provider evidence remains advisory. Index informs; Ophaelis authorizes.
Index informs. Ophaelis authorizes.
Commands are intentionally disabled in this public/mock surface. Real commands require admin auth and server-side protection.
/api/admin/status-snapshot/api/admin/live-proof/capability-coverage/api/admin/live-proof/latest-summary/api/admin/events/recent/api/admin/decisions/recent-summary/api/admin/decisions/recent-cyber-summary/api/admin/decisions/recent-by-domain/api/admin/decisions/recent-by-classAdmin wiring should not happen in the public browser until authentication and access boundaries are intentionally designed. This panel documents order, not active data access.
| created_at | tenant_id | domain | intent_id | verdict | authority_level | risk_level | confidence_level | reversibility_level | requires_human_confirmation | policy_pack_hash | intent_pack_hash | proposals_status | proposal_strategy_used | openai_ok | anthropic_ok |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| No decisions yet. | |||||||||||||||
| created_at | tenant_id | domain | intent_id | verdict | authority_level | risk_level | confidence_level | reversibility_level | requires_human_confirmation | policy_pack_hash | intent_pack_hash | proposals_status | proposal_strategy_used | openai_ok | anthropic_ok |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| No decisions yet. | |||||||||||||||
Internal founder/operator visibility into Ophaelis governance truth: provider health, recent governance decisions, and Decision Lab workflows.
npm install npm run build npm run deploy
1) Click Refresh in Overview. 2) Hard refresh browser (Ctrl+Shift+R). 3) Verify /api routes are returning JSON. 4) Re-run build and redeploy if UI is stale.