Governance Dashboard

Platform safety, cost controls, and eval quality

Snapshot generated at: 2026-04-13T03:50:00Z

Mixed telemetry

Includes live signals where available plus illustrative and snapshot values for portfolio demonstration of observability, guardrails, and evaluation patterns.

Trust Control Flow

Human approval required before strategist execution

Execution paused for review at HITL checkpoint

Policy check passed before response release

Decision trace logged with request and trace IDs

Guardrail-triggered outputs are blocked or redacted

Telemetry Snapshot

Policy Controls

ControlStatus
Content Security PolicyActive
Rate Limiting (Upstash Redis)Active
Prompt Injection DetectionActive
Competitor Mention FilterActive
Hallucination HeuristicActive
XSS Sanitization (DOMPurify)Active
IP SHA-256 HashingActive
npm audit (CI-enforced)Active
Eval Regression GateActive
HITL Checkpoint (Multi-Agent)Active

Recent Audit Events

TimeEventSeverity
14:07:58guardrail.blockedwarn
14:05:03guardrail.redactedinfo
14:03:12eval.regressionok
14:01:44rate_limit.triggeredwarn
13:58:31deploy.passedok
13:55:09guardrail.blockedwarn
13:51:22eval.completedok

Token Latency vs. Cost (24h)

vs. cost/request (24h)
0ms328ms657ms985ms1.3s$0.0000$0.0006$0.0012latency (ms)cost / req ($)16:0020:0000:0004:0008:0012:00

Hover to inspect hourly values · Blue = latency · Teal dashed = cost/request

Business hours show higher latency with lower cost/request due to increased cache hit rates. Simulated data — production would stream from OTEL collector via /api/enterprise-sim.

Why this matters to enterprise buyers

CFO perspective

Cost per interaction is tracked and gated. Rate limiting prevents runaway spend. Every token cost is observable.

CTO perspective

Guardrails, eval gating, and HITL checkpoints are code — not policy docs. They ship with the system and fail CI if broken.

CISO perspective

No raw IPs stored, prompt injection detected at the edge, all outputs sanitized before render, audit log immutable.