RFC-0001 • Full Specification • DRAFT

Exogram Action
Admissibility Protocol

Identifier: RFC-0001Author: Exogram EngineeringUpdated: March 2026
0

Layers

0

Invariants

0

Threat Classes

0

Failure Modes

0

Sustained RPS

5.7ms

Compute

DIGEST

Traditional software systems execute actions through deterministic code paths. LLM-driven systems propose actions through probabilistic inference. EAAP defines a strict deterministic control plane between AI proposal and real-world execution — ensuring no action reaches production without verified admissibility.

“Agents are probabilistic. Infrastructure is deterministic.”

Exogram is the execution control plane between them.

— EAAP Core Thesis

The Catalyst

An enterprise orchestration framework cannot securely govern its own database writes. The agent cannot act as its own security guard.

Critical Gap

No orchestration framework — LangChain, NemoClaw, CrewAI — provides cryptographic execution gating. They route actions. Exogram governs them.

Framework Independence

Orchestration Agnosticism

EAAP does not dictate how an agent reasons, plans, or selects tools. It does not compete with orchestration frameworks. EAAP solely defines how a proposed state change is cryptographically authorized and committed to the immutable ledger.

Any orchestration framework that produces a state-changing action can submit it to the EAAP control plane. The protocol governs the boundary between inference and execution — not the inference itself.

Intelligence

Any LLM Provider

Orchestration

LangChain · NemoClaw · CrewAI

Governance

Exogram EAAP

Architecture

Architecture Overview

AI Agent

Proposes action

Exogram Checkpoint

SHA-256 state hash

Enterprise DB

Rejects if hash missing

EAAP Four-Layer Architecture

1. Motivation

When AI systems transition from generating text to executing real-world actions, the risk surface expands:

Sending financial communications
Modifying billing records
Deleting regulated data
Updating compliance docs
Triggering operational workflows
Executing production API calls

“Agents are probabilistic. Infrastructure is deterministic. Exogram is the execution control plane between them.”

EAAP prevents unauthorized AI actions, prevents execution under unresolved conflict, enforces role/policy/confidence thresholds, guarantees cryptographic state integrity, and produces a tamper-detectable audit record.

EAAP does not improve model intelligence. It governs model admissibility.

2. Threat Model

EAAP assumes the following conditions. Under all conditions, EAAP fails closed.

🤖

2.1 Model Unreliability

Language models produce hallucinations, contradict stored facts, and generate semantically false statements. Exogram treats all model output as untrusted input.

💉

2.2 Prompt Injection

Attackers override constraints, induce self-contradiction, mask harmful instructions, or manipulate tool usage.

⏱️

2.3 State Drift (TOCTOU)

Between evaluation and execution: roles change, constraints mutate, facts update, conflicts emerge, confidence decays.

🔥

2.4 Infrastructure Degradation

Model provider outages, embedding unavailability, vector index degradation, circuit breaker activation, database latency.

👤

2.5 Insider Risk

Manual database modification, audit log tampering, or replay of previously approved actions.

3. Architectural Layers

🔒

Layer 1

Ledger Governance

Purpose: Enforce ledger integrity.

PII scrubbing via deterministic pattern detection, encryption at rest, semantic indexing, conflict detection, confidence scoring, fact locking, and audit event logging.

⚠️ No silent overwrites. Contradictions require explicit resolution.
🧠

Layer 2

Meaning Engine

Purpose: Assemble bounded, deterministic context.

Namespace isolation, deterministic relevance scoring, temporal decay weighting, conflict surfacing, context health classification, snapshot generation, and HMAC snapshot signing.

⚠️ Context assembly is mathematical, not generative.
⚖️

Layer 3

Judgment Engine

Purpose: Deterministic admissibility evaluation.

Authority validation, fact consistency enforcement, constraint evaluation, confidence threshold enforcement, and escalation classification.

⚠️ Zero LLM inference. Judgment is deterministic Python logic.
🛡️

Layer 4

Action Admissibility

Purpose: Guarantee execution integrity.

Claim extraction from payload, pre-flight conflict detection, full state hashing, evaluation record creation, commit validation, and immutable action ledger.

⚠️ Layer 4 is the final execution gate. No action bypasses it.

4. Protocol Invariants

Mandatory and non-configurable. Cannot be weakened without a major version change.

PII Air Gap

No detected PII enters persistent storage or vector embeddings

Explicit Source

All stored facts require provenance attribution

Encryption at Rest

All content encrypted with per-user Fernet keys before persistence

Namespace Isolation

Retrieval and evaluation scoped strictly to user namespace

No Silent Overwrite

Conflicting facts require explicit resolution

Conflict Logging

All contradictions produce durable, auditable records

Immutable Audit Chain

Cryptographically chained audit events — tamper-detectable

Deterministic Judgment

Execution gates use code, not LLM inference

Confidence Decay

Facts degrade in authority over time unless reinforced

Constraint Binding

Locked facts cannot be violated without explicit unlock

State Hash Integrity

Execution requires identical state between evaluation and commit

Evaluation Expiry

Approvals expire after a defined TTL — no stale tokens

Escalation Routing

Blocked actions route to structured escalation targets

Hard Deletion (GDPR)

Full deletion removes vectors, ciphertext, and all records

5. Evaluation Protocol

POST /v2/actions/evaluate

5.1 Required Inputs

{
  "action_type": string,
  "actor_role": string,
  "impact_scope": string,
  "payload": object
}

5.2 Execution Sequence

1
Extract claims from payload
2
Scrub PII (deterministic)
3
Detect ledger conflicts
4
Assemble deterministic context snapshot
5
Execute Layer 3 logic gates
6
Compute full state hash (SHA-256)
7
Persist evaluation record
8
Return decision and evaluation_id

State Hash Formula

state_hash = SHA-256(
    sorted(relevant_objects) ||
    policy_version ||
    namespace_id ||
    floor(timestamp, window)
)

6. Commit Protocol

POST /v2/actions/commit
{ "evaluation_id": string }
1
Retrieve evaluation record
2
Verify not expired
3
Recompute full state hash
4
Compare with evaluation hash
5
If mismatch → reject with 409 Conflict
6
Persist immutable action ledger record
7
Return committed

The commit cannot modify the evaluation decision. The commit fails under state drift.

8. Failure Modes

EAAP fails closed under all degradation conditions.

Model provider outage
Embedding unavailability
Conflict detection failure
Circuit breaker activation
State hash mismatch
Expired evaluation
Namespace violation
Constraint violation
403 Forbidden · 409 Conflict · 503 Service Unavailable — EAAP never defaults to allow.
Production Validated

10. Live Performance Metrics

Production load test results at 50 concurrent agents. These metrics validate negligible compute overhead.

88 RPS

Sustained requests per second

5.7ms

Median compute latency

0

DB secrets exposed

Failure rate: <1.4% at 25 users · <4% at 50 users · All under 5% SLA threshold

Conclusion

The Exogram Action Admissibility Protocol establishes a deterministic control plane between AI inference and real-world execution.

Agents are probabilistic. Infrastructure is deterministic. Exogram is the execution control plane between them.