PromptGuard goes beyond access control to provide four governance capabilities that Chris Hood identified as missing from every AI security platform: agent identity, behavioral drift detection, tamper-evident audit trails, and runtime behavioral evaluation.
Why Governance Is Not Access Control
Access control answers “is this request allowed?” Governance answers harder questions:- Who is this agent? (Agent Identity)
- Is it behaving the same way it did last week? (Behavioral Drift Detection)
- Has anyone tampered with the audit trail? (Tamper-Evident Audit)
- Can we prove compliance to an auditor? (Runtime Behavioral Evaluation)
Agent Identity
The Problem
Most AI security platforms accept a free-formagent_id string. Anyone with the project API key can claim to be any agent. There is no verification.
The Solution
PromptGuard offers verified agent credentials. Each agent is registered and receives a cryptographic secret (pgag_...) that authenticates requests.
Backward Compatibility
Requests withoutX-Agent-Credential still work. They are treated as unverified — the agent_verified field in responses and audit logs will be false.
Credential Rotation
Behavioral Drift Detection
The Problem
An agent that normally usessearch and calculator suddenly starts calling send_email and http_post exclusively. Per-request validation sees each call as individually safe. Only stateful behavioral analysis detects the drift.
The Solution
After an agent accumulates enough observations (configurable, default 50 tool calls), PromptGuard freezes a behavioral baseline — a snapshot of the agent’s normal tool-usage distribution. Every subsequent request is compared against this baseline using Jensen-Shannon divergence, a symmetric, bounded (0–1) measure with no division-by-zero issues. If the divergence exceeds the configured threshold (default 0.3), aBEHAVIORAL_DRIFT alert fires with:
- Divergence score
- Top changed tools (baseline vs. current distribution)
- Recommended action
Example Alert
Tamper-Evident Audit Trail
The Problem
An audit log that can be silently modified is not an audit log. Most platforms hash individual events but do not chain them — meaning a deleted or altered event goes undetected.The Solution
Every audit event’s SHA-256 integrity hash incorporates the previous event’s hash (previous_hash), forming a cryptographic append-only chain. If any event is modified, inserted, or deleted, the chain breaks.
Verify the Chain
Runtime Behavioral Evaluation
The Problem
Compliance auditors need narratives, not data dumps. They need to understand what happened, what controls were in place, and whether those controls worked.The Solution
PromptGuard generates governance reports with narrative sections for auditors:| Section | Contents |
|---|---|
| Agent Identity | Registered agents, verification rates, unverified access attempts |
| Behavioral Drift | Drift alerts triggered, agents that drifted, resolution actions |
| Audit Integrity | Chain verification result for the period |
| Security Decisions | Block/allow/redact counts with explanation summaries |
| Incident Timeline | Chronological narrative of critical events |
Next Steps
Audit Logs
View and export audit events
Compliance
Security certifications and data handling
Agent Security
API reference for agent endpoints
Enterprise
Enterprise deployment guide