AI agents. Fully auditable. Compliance-grade by default.

The only open-source agent platform with signed audit bundles, deterministic replay, per-session hash chains, and threshold signing — all in a single self-hosted binary. SOX, HIPAA, FINRA, and 21 CFR Part 11 ready.

terminal
$ cosmictron create my-agent --template voice-agent
> Module scaffolded: voice-agent
> TypeScript client generated

$ cosmictron dev
Ed25519 event signing active
Hash chain: per-session Merkle chain initialized
Deterministic replay sandbox ready

Ready. Every action is signed, chained, and replayable.
Open Source · AGPL 3.0 + Commercial

Free under AGPL 3.0 for organizations under $5M ARR or deployments up to 10,000 concurrent agents. Commercial license available for larger deployments or proprietary use.

THE PROBLEM

AI agents have no audit trail.

In regulated industries, every action must be attributable, tamper-evident, and reproducible. But every AI agent framework ships with none of that. You're left bolting on signing, audit logging, key management, and compliance tooling — each from a different vendor, each requiring its own BAA.

The status quo
Agent Framework Audit Logging
Key Management Signing Service
Compliance Tooling Admin UI
6 systems · 6 BAAs · no no compliance story
Cosmictron
cosmictron single binary
Orchestration Signing Hash Chain Replay Admin UI
1 single binary · compliance-grade by default
AGENTIC MEMORY

Memory that behaves like a brain, not a vector database.

Most agent frameworks treat memory as a separate subsystem — a vector store bolted on, queried at the edge. Cosmictron treats memory as a first-class part of the runtime, event-sourced into the same signed log as every other action the agent takes. That difference is why banks are picking it up.

Spreading activation

Retrieval doesn't stop at the top-k semantic matches. Activation spreads through the memory graph — if a memory is retrieved, related memories are surfaced with decaying weight. This is how human recall actually works, and it recovers context that flat vector search misses.

Event-sourced by construction

Every memory write is an event in the same signed, hash-chained audit log as every other action the agent takes. You can prove exactly which memories existed when a decision was made, and export the memory trail alongside the session bundle.

Consolidation & reflection

Short-term memories are consolidated into longer-term semantic memories on a background loop. The reflector compresses redundant traces, detects communities (related memory clusters), and promotes the signal. No manual curation required.

Per-tenant isolation

Memory is scoped to tenants and sessions at the runtime layer — not bolted on at the query layer where one bad filter means a catastrophic cross-tenant leak. The same isolation guarantees that apply to the event log apply to memory.

Compliance-aware retention

Memories inherit legal hold, PII encryption, and selective redaction from the core platform. A bank can guarantee that an agent's memory of a customer interaction will be redacted for external auditors and preserved under hold — without adding a separate system.

Deterministic replay

Because memory operations are events, replaying a session replays its memory state. The agent that made yesterday's decision can be interrogated today with the exact memories it had at the time. Critical for post-incident review in regulated industries.

How this compares to bolting a vector DB onto your agent framework

Capability Cosmictron
(native)
Pinecone / Weaviate
(vector DB)
LangChain + Vector DB
(bolt-on)
CrewAI + Vector DB
(bolt-on)
Native memory layer Others delegate to Pinecone / Weaviate / Chroma
Spreading activation retrieval
Event-sourced memory writes
Signed, hash-chained memory audit trail
Per-tenant isolation at runtime Partial = query-layer filtering only
Automatic consolidation & reflection
PII encryption on memory records
Legal hold on specific memories
Deterministic replay with memory state
Why does this matter for banks?

When a regulator asks "what did this agent know when it made this decision?", a bolted-on vector DB gives you an approximate answer — you query it now and hope the index hasn't drifted. Cosmictron gives you the provable answer — replay the session and you see the exact memory state at the moment of the decision, cryptographically signed. Same substrate. Same audit trail. No reconciliation.

CAPABILITIES

Everything a regulated agent platform needs.

Core Runtime

Stateful Agent Orchestration

Durable sessions, supervisor handoff, parent-child delegation, and A2A messaging. Agents coordinate across process boundaries with cryptographic accountability at every hop.

Deterministic Replay

LLM I/O and tool results captured verbatim. Clock, RNG, and A2A calls are virtualized so any session can be replayed bit-for-bit. The same input + same state = same output — provable.

Cross-Node Orchestration

Agents span multiple Cosmictron deployments over HTTP/2 + CBOR + Ed25519 auth. Distributed audit bundles export across nodes with cross-node merge.

Compliance & Audit

Signed Audit Bundles

CBOR sequences with per-event and bundle-level Ed25519 signatures. Self-verifying exports. Selective redaction via per-field commitment scheme lets auditors verify redacted bundles without seeing the data.

Per-Session Hash Chain

Merkle-style chain proves no events were deleted or reordered. Combined with RFC 3161 cryptographic timestamping, this satisfies 21 CFR Part 11, GxP, and SOX Section 404 evidence requirements.

Legal Hold & Streaming Export

Session retention override for HIPAA/21 CFR Part 11 compliance. Memory-bounded CBOR sequence export handles arbitrarily large bundles without loading the full dataset into RAM.

Security

Ed25519 Per-Event Signing

Every event is cryptographically attributable. Keys follow a lifecycle: Active → Retired → Revoked, with emergency rotation support. FROST threshold signatures (t-of-n) enforce multi-party control for SOX and PCI-DSS.

PII Capture Gate

Sensitive fields encrypted with AES-256-GCM. Access gated by a pii:read capability — no capability, no plaintext. Works with legal hold to keep encrypted records even after deletion requests.

RFC 3161 Timestamping

Periodic anchors to an external TSA bind audit events to wall-clock time accepted by pharma GxP regulators. Independent of Cosmictron infrastructure — verifiable with any RFC 3161-compliant tool.

Distributed Key Generation (DKG) Coming Soon

Removes the last trust boundary in threshold signing. Each share holder generates their own polynomial share locally — no single party ever sees the full signing key, not even momentarily. True multi-party custody for regulated deployments.

Platform

Admin Dashboard

7-page React/TanStack Start app: approval queues, orchestration trees, session explorer, agent registry, event browser, bundle export wizard, and settings. Ships with the binary.

Marketplace

Capability-based agent discovery with version pinning and contract verification at publish time. Install, pin, and verify third-party agents without leaving the platform.

Single Binary

Orchestration engine, audit infrastructure, key management, admin UI, and marketplace — all in one self-hosted binary. No sidecar services. No external dependencies for the compliance stack.

Multi-Region Orchestration (Data Residency) Coming Soon

Tag sessions with required regions and route agent workloads to nodes in specific jurisdictions — GDPR, data residency, and cross-border compliance by design.

HOW IT WORKS

Three steps to a compliance-grade agent.

1

Define your agent and its events

module.rs
#[table(name = "agent_events")]
pub struct AgentEvent {
    #[primary_key] #[auto_inc]
    pub id: u64,
    pub session_id: SessionId,
    pub agent_id: Identity,
    pub kind: EventKind,
    pub payload: Bytes,
    pub timestamp: u64,
}
// Every insert: CBOR-serialized + Ed25519-signed
// automatically. No extra code.
2

Write your agent logic — audit is automatic

module.rs
#[reducer]
fn run_tool(ctx: &ReducerContext, tool: ToolCall) {
    // LLM I/O and tool results captured verbatim.
    // Clock + RNG virtualized for deterministic replay.
    // Hash chain updated. Signature appended.
    // pii:read gate enforced if payload has PII fields.
    db::insert(AgentEvent {
        session_id: ctx.session_id,
        agent_id: ctx.sender,
        kind: EventKind::ToolCall,
        payload: tool.serialize(),
        timestamp: ctx.timestamp,
    });
}
3

Export a self-verifying audit bundle

export.py
# Stream a signed CBOR audit bundle for a session.
# Memory-bounded — works for any bundle size.
bundle = await cosmictron.export_bundle(
    session_id=session_id,
    verify_chain=True,     # reject if hash chain broken
    rfc3161_anchor=True,  # include TSA timestamp proof
)
# Bundle is self-verifying. No Cosmictron needed
# to audit it later. Hand it to an examiner.
SEE THE DIFFERENCE

You have logging. You don't have an audit trail.

Every code example on the left is real. It's what teams build when they try to retrofit compliance onto an existing agent framework. The right side is Cosmictron.

01 Write a signed, tamper-evident audit event

LangChain + custom signing ~35 lines
# You wire all of this yourself
import cbor2, hashlib
from cryptography.hazmat.primitives.asymmetric.ed25519 import Ed25519PrivateKey

_signing_key = Ed25519PrivateKey.generate()
_chain_hash = bytes(32)  # genesis

def write_event(session_id, kind, payload):
    global _chain_hash
    event = {
        "session": session_id,
        "kind": kind,
        "payload": payload,
        "prev_hash": _chain_hash,
    }
    encoded = cbor2.dumps(event)
    sig = _signing_key.sign(encoded)
    _chain_hash = hashlib.sha256(
        _chain_hash + encoded
    ).digest()
    # Now persist to Postgres — separately.
    # Key rotation? Threshold signing? Out of scope.
    # RFC 3161 anchor? Another integration.
    db.execute("INSERT INTO audit ...")

Plus: key storage, rotation policy, chain reconstruction on restart, separate export pipeline...

Cosmictron 8 lines
#[reducer]
fn run_tool(
    ctx: &ReducerContext,
    tool: ToolCall,
) {
    db::insert(AgentEvent {
        session_id: ctx.session_id,
        kind: EventKind::ToolCall,
        payload: tool.serialize(),
        timestamp: ctx.timestamp,
    });
}
// Ed25519-signed. CBOR-serialized.
// Hash chain updated. Automatic.
// Zero extra code.

02 Replay a session deterministically

The status quo Not possible
# With LangChain / CrewAI:
# You can log inputs and outputs,
# but you cannot guarantee replay
# produces the same result.
#
# datetime.now() in your tool?
#   Different result on replay.
# random.choice() in your agent?
#   Different result on replay.
# A2A call to another agent?
#   Non-deterministic.
#
# For 21 CFR Part 11, you need to
# prove: same input + same state =
# same output. No existing framework
# makes this possible without
# replacing its entire runtime.
Cosmictron 3 lines
# Replay any session bit-for-bit.
# Clock, RNG, and A2A are virtualized.
result = await cosmictron.replay(
    session_id=session_id,
    verify_hash_chain=True,
)
# Sandbox guarantees same output.
# GxP evidence: this is a validated
# system — provably.

03 Export an audit bundle for an examiner

The status quo 6 systems to query and merge
# You pull from:
# 1. Application DB (agent logs)
# 2. Signing service (signatures)
# 3. Key store (public keys)
# 4. TSA provider (timestamps)
# 5. Distributed nodes (if multi-node)
# 6. Your own export pipeline
#
# Then: correlate timestamps,
# merge signatures, hope nothing
# was lost in a restart.
#
# The examiner needs your
# infrastructure running to
# verify anything.
Cosmictron 5 lines
# One call. Memory-bounded streaming.
# Works for arbitrarily large sessions.
bundle = await cosmictron.export_bundle(
    session_id=session_id,
    verify_chain=True,
    rfc3161_anchor=True,
    include_public_keys=True,
)
# Self-verifying CBOR sequence.
# No Cosmictron needed to audit.
# Hand to examiner. Done.
WHAT YOU REPLACE

One binary. Six systems retired.

Python agent framework (LangChain / CrewAI)
Native Rust orchestration engine

Durable sessions, supervisor handoff, parent-child delegation, and A2A messaging with cryptographic accountability at every hop. No framework tax.

External state database + session store
Embedded stateful sessions, built in

Every agent session persists automatically. Cross-session recall is a SQL query. No external DB, no cache layer, no serialization code.

Custom audit logging + signing service
Ed25519 signed events, hash chain, CBOR bundles

Every event is signed at write time. A Merkle-style hash chain proves no events were deleted or reordered. Self-verifying export bundles need no external validator.

Key management service + HSM vendor
Lifecycle key management + FROST threshold signing

Keys follow an Active → Retired → Revoked lifecycle with emergency rotation support. FROST t-of-n threshold signing enforces multi-party control for SOX and PCI-DSS — no HSM required.

Compliance tooling + RFC 3161 TSA integration
Cryptographic timestamping built in

Periodic RFC 3161 anchors bind audit events to wall-clock time accepted by pharma GxP regulators. Verifiable with any standard RFC 3161 tool.

Custom admin dashboard
7-page compliance dashboard ships with the binary

Approval queues, orchestration trees, session explorer, agent registry, event browser, bundle export wizard, and settings — no build required.

One binary. Zero compliance glue.

USE CASES

Built for agents in regulated industries.

Financial Services (SOX / FINRA)

Four-eyes approval, maker-checker separation, signed access log, and hash chain satisfy SOX Section 404. Per-event signing and tenant isolation meet FINRA audit requirements. Export cryptographically verifiable bundles for examiners.

SOX 404FINRA

Healthcare (HIPAA)

Legal hold prevents session deletion during active investigations. PII capture gate encrypts sensitive fields with AES-256-GCM behind a pii:read capability. Full audit trail with signed events proves chain of custody for PHI.

HIPAA

Pharma & Life Sciences (21 CFR Part 11 / GxP)

Hash chain + RFC 3161 cryptographic timestamping + deterministic replay constitutes validated system evidence. Same input + same state = same output, provably. GxP qualification packages export directly from the admin dashboard.

21 CFR Part 11GxP

Any Regulated Agent Workflow

Multi-party orchestration, cross-node deployment, threshold signing, and streaming audit export scale to enterprise agent workloads. Self-hosted — your data never leaves your infrastructure.

Self-hostedOpen source
COMPARE

How we're different.

Other frameworks build agents. Cosmictron builds agents with a compliance story.

Feature Cosmictron LangChain CrewAI Temporal OpenAI Assistants
Self-hosted
Open source
Stateful sessions
Signed events
Hash chain
Deterministic replay
RFC 3161 timestamping
Threshold signing
PII encryption
SOX/HIPAA/GxP evidence
Cross-node orchestration
Admin dashboard
Marketplace

LangChain/LangGraph and CrewAI are Python frameworks — great for building agents, not for proving what agents did. Temporal is a workflow engine with no LLM-native replay or signing. OpenAI Assistants is a managed service — no self-host, limited audit export. Cosmictron is the only option purpose-built for compliance-grade agent auditability.

REAL-TIME + MEMORY

One binary. Zero assembly required.

One binary replaces an entire infrastructure stack. Building a production agent system with LangChain or CrewAI typically requires assembling a state database, vector store, message queue, WebSocket server, session manager, event log, and custom memory layer. Cosmictron includes all of these out of the box.

Capability Purpose Cosmictron LangChain CrewAI AutoGen OpenAI Assistants Temporal
Real-time WebSocket subscriptions Stream agent state to clients
Sub-10ms event delivery Low-latency updates
Built-in persistent memory No external vector DB
Automatic session state No external state store
Event sourcing Replay history
Incremental views (DBSP) Efficient query updates
Durable conversation history Survive restarts
Session pause/resume Long-running workflows
Agent-to-agent messaging Multi-agent coordination
Voice/media pipeline Real-time voice agents
Telephony ingress Phone calls without external provider

LangChain, CrewAI, AutoGen, and similar frameworks require assembling Redis + PostgreSQL + Pinecone/Weaviate + RabbitMQ/Kafka + a WebSocket server + custom state machines to match what Cosmictron ships in a single binary.

PERFORMANCE

Numbers, not promises.

0 µs
signed event write
p50 — CBOR serialize + Ed25519 sign
0 s
10k-event bundle export
streaming CBOR, memory-bounded
0
events/session replayed
~0.5s — deterministic sandbox
0
binary to deploy
orchestration + audit + admin UI

Benchmarked on a single node. No caching tricks. Reproducible.

LICENSE

Open source, commercially backed.

Cosmictron is free and open source under AGPL 3.0 for any organization with under $5M in annual revenue, or any deployment of up to 10,000 concurrent agent sessions. Qualify on either threshold and you pay nothing — even if you exceed the other.

Above both thresholds, or if you need to keep your code proprietary or embed Cosmictron in a commercial product, a commercial license removes all AGPL copyleft requirements and includes access to support SLAs and private forks.

COMING SOON

Cosmictron Cloud is coming.

Managed hosting, agent deployment, built-in observability. Join the waitlist.

No spam. Just one email when we launch.