Governed Execution Pipeline
Every AI action flows through three trust boundaries โ from proposal to cryptographic receipt. Click any stage to see its invariant and proof output.
From proposed action to verifiable proof
HELM turns policy inputs into deterministic execution records and offline-verifiable evidence without letting raw tool calls slip around the boundary.
Policies, rules, approvals
Governance starts with typed constraints from policy files, regulatory rules, and human permission checkpoints.
Deterministic execution
The core validates, policy-checks, executes in a sandbox, and fails closed whenever the boundary cannot prove it is safe.
Artifacts anyone can inspect
Every action leaves an auditable trail: receipts, proof structures, and completed action records that survive outside the runtime.
Deploy in 5 minutes
HELM is framework-agnostic. Here are exact code changes for popular stacks.
$ git clone https://github.com/Mindburn-Labs/helm-oss.git$ cd helm-oss && go build ./cmd/helm-proxy$ ./helm-proxy --config config.yaml$ export OPENAI_BASE_URL=http://localhost:8420/v1Works with every MCP client
HELM is MCP-native. Any client that speaks the Model Context Protocol can use HELM as its execution authority โ no adapters, no shims.
Framework-agnostic by design
Change one URL โ every framework gets receipts, policy enforcement, and offline verification.
What's free. What's not. Why.
OSS makes HELM the default runtime boundary. HELM Enterprise becomes the default operating system for that boundary at scale.
OSS Kernel
- Deterministic proposal โ effect pipeline with fail-closed enforcement
- Hash-linked receipt DAG with session-anchored integrity
- Gas-metered execution with configurable limits per action
- Human-in-the-loop checkpoints with cryptographic attestation
- L1/L2/L3 test vectors with deterministic JSON output
HELM Enterprise
- Cross-org trust delegation with revocable credentials
- Model benchmarking and cost optimization analytics
- Salesforce, SAP, ServiceNow native integrations
- Multi-cluster deployment with centralized policy management
- SOC 2, HIPAA, and ISO 27001 compliance automation
- TEE-bound execution with silicon-level tamper evidence
Common questions
Ship governance today
Clone the repo. Run the conformance suite. Deploy to production.