Set limits on AI usage — then prove it happened
This dashboard is for buyers and operators (CFO/CTO). Create your organisation, issue an API key for your app, add credits, and view reports.
How Sparse Guard works: your app asks for approval before an AI call (to prevent runaway spend), then reports back after the call (for accurate billing + audit).
Setup: Sign in → Create organisation → Create API key → Add credits
Operate: Your app uses the API key to get approvals and record usage
Report: Download credits and emissions reports for finance/audit
Confirms the service is online and responding.
Create an account or sign in to manage your organisation, billing, and reporting.
Create a tenant (org) using your JWT.
Create an API key for your app. This is the credential your workloads use to request approvals and record usage.
Credits are your AI budget. Add credits via Stripe, then Guard enforces usage against that budget.
Uses the clientSecret from your last Create intent. Enter card details, then Pay now.
Works only if ALLOW_ADMIN_TOPUP=1. Uses ADMIN_TOKEN.
Signed governance receipts — receipts you can verify; verify before execute. Call POST /v1/verify with the signed_receipt object from POST /v1/govern or POST /v1/settle (Ed25519 signed; hybrid PQ optional).
Finance/audit view. Paste an API key to load credit spend and the emissions report (optional).
| Kind | Amount | Currency | Ref | Created |
|---|
| TS | Model | Tin | Tout | J | kWh | gCO₂e | Cost | ATG (verified) | Method |
|---|
Agents can’t be tricked into dangerous actions. Rows here are Quarantined actions and Denied actions from POST /v1/atg/gate (preflight) and enforced paths such as POST /v1/actions/webhook/send. Injection evidence lives in reason_codes_json / evidence_json. Hidden prompt injections get quarantined before they trigger tools, writes, or sends. Only this table’s co2e_g sums count as verified avoided emissions — never claimed without a stored row.
| TS | Decision | Kind | Source | Name | Target | Reason / codes | gCO₂e |
|---|
Receipt verification
Signed receipts from POST /v1/govern, POST /v1/settle, and POST /v1/atg/gate include payload_hash, expires_at, and signatures. They are server-verifiable with POST /v1/verify — downstream systems should treat decision: "ACCEPT" and code: verify_ok as the execution gate.
High-risk paths such as POST /v1/actions/webhook/send accept optional guard_receipt (an atg_gate signed receipt). Invalid, expired, or tampered receipts are rejected before action execution.
Active signing keys — public material from GET /v1/public-keys (no API key).
Signed event stream
Security events you can automate — Signed webhook events for SIEM/SOAR. Verify event signatures before acting.
Capabilities
Least privilege, enforced — approvals become scoped capabilities. Tenant-bound, scoped, expiring. Single-use enforcement for high-risk execution paths.
ATG ALLOW for risky actions can return a signed capability_token. Verify with POST /v1/capabilities/verify before executing downstream work; POST /v1/actions/webhook/send requires a valid capability when enforcement is on.
AI asset registry
Know what agents are running — control-plane inventory for agents, apps, tools, connectors, and MCP-style integrations.
Governance coverage — GET /v1/assets/list with API key. Shadow / unknown assets surface when risky flows carry hints but the asset is not registered.
Owner, scopes, environment, last seen — each row is an operational record, not a CMDB dump.
Supply-chain artifacts
Signed artifacts — manifests are hashed and verified with Ed25519 (same key discipline as receipts unless a dedicated artifact key is configured).
SBOM and provenance — GET /v1/artifacts/:id/sbom surfaces SBOM links and summaries. Gated promotion — dev → stage → prod only, with policy checks.
Verify before promote — POST /v1/artifacts/verify then POST /v1/artifacts/promote. Promotion decisions with receipt — audit rows under promotions.
Distillation Monitor
Stop model scraping with verified enforcement. Live: GET /v1/statements/dg-blocks. Demo fallback: /console/sample-results.json.
Campaign evidence
Recent DG blocks
| Time | Mode | Reason | Prompt family | RPM | TPM | Tokens avoided | CO₂e g |
|---|
No verified distillation campaigns detected yet until dg_blocks has live rows. Showing demo evidence until live enforcement data appears. Carbon: avoided CO₂e KPIs use verified dg_blocks rows only, not suspicion flags.
ATG Enforcement
Agents can’t be tricked into dangerous actions. Verified ATG enforcement — live GET /v1/statements/atg-blocks; demo fallback /console/sample-results.json (atg_operator_demo).
Receipts prove minimization.
Action coverage
Enforced action classes (pre-action gate + POST /v1/actions/webhook/send for webhook). Each path must call the gate before execution.
Injection evidence
Evidence table
| Time | Decision | Action kind | Source kind | Reason codes | Actor | gCO₂e |
|---|
No verified ATG enforcement events detected yet. Showing demo evidence until live ATG enforcement data appears.
This is the only thing customers need to understand after minting an API key: Approve → Execute → Record. Sparse Guard sits in front of your model/tool calls and prevents runaway spend by making a decision before you pay.
You send a lightweight "plan" for the request. Guard returns ALLOW/DENY, a reservationId, and requiredD (USL right-sizing).
If allowed, you call your model/tool provider using the limits Guard recommends (tokensOutMax etc).
You send the reservationId plus what actually happened (tokens, optional quality metric φ). Guard finalises credit spend and writes the audit receipt.
For webhooks, email sends, tool calls, memory writes, connector writes, deploys, and external fetches, call POST /v1/atg/gate before executing the action.
- Approve → ATG Gate → Execute → Record for risky actions
- Approve → Execute → Record for plain model calls
If decision=ALLOW, execute the action.
If decision=QUARANTINE or DENY, do not execute it.
kappa = quality tolerance (0–1).
gamma = scaling parameter.
d = requested capacity (dimension).
phi (φ) = observed quality metric (0–1) you can optionally report back to improve SatConform.
tokensOutMax = max output tokens you plan to allow.
Flows: Plain model calls: govern → provider → settle. Agent actions: govern → atg/gate → action → settle.
Signed receipts available. /v1/govern, /v1/settle, and /v1/atg/gate return signed receipts. Use POST /v1/verify to verify before executing high-risk downstream actions.
Signed event stream available. Use signed webhook events for SIEM/SOAR and verify event signatures before acting.