Live Dragon governance feed — fire demo alerts, monitor active incidents, review the audit trail.
🎮 Fire a Live Alert
Creates a live P1/P2 alert in Dragon. Appears in the feed below within seconds.
No active alerts
Use the fire buttons above
No governance decisions yet
6 real governance scenarios. Each fires a live risk assessment through Dragon's policy engine.
pytest tests/integration/Test environment only
npm run formatStyle changes only
terraform apply -target=production -auto-approveFull prod infra update
kubectl set env deployment/api PRICE_MULTIPLIER=1.30$500K revenue impact
aws iam attach-user-policy --user-name intern-bob --policy-arn ...AdministratorAccessFull admin access to AWS
DROP DATABASE production_customers;Permanent data deletion
15-signal weighted risk classifier on every authentication event. TOR detection, impossible travel, device fingerprinting.
Normal Login
Typical weekday login from known device, home country, business hours
TOR Exit Node
Login from TOR exit node, new unrecognized device, atypical country
Impossible Travel
User signed in from NYC 28 min ago — now attempting from Moscow
Step-Up Challenge
Known user from known device but logging in at 3am — triggers MFA
TOTP / FIDO2
RFC 6238 + WebAuthn
SCIM 2.0
Enterprise provisioning
OAuth 2.0 / OIDC
SSO + token flows
ML Risk Engine
15-signal classifier
Live status across all Klynx AI services. Auto-checks every 60 seconds.
Dragon Core
AI Governance Engine
DevOps Orchestrator
RCA + Autofix + Playground
KlynxAuth
Identity + MFA Platform
KlynxBot
19-Domain AI Assistant
KlynxChip
Edge AI Inference Runtime
KlynxGuard
API Security Layer
KlynxCortex
AGI Memory + Reflection
Marketing Site
klynxai.com
Data Confidence & Context Integrity family — the Layer 1→2 gate. Determines whether downstream inference is allowed to run.
KlynxChip Secure Decision Ledger — Ed25519 + SHA-256 chain integrity
Chain Status
—Entries Verified
—
Ed25519 Signatures
—
ECDSA P-256 · offline verifiable
Click Verify Chain to audit the KlynxChip decision ledger
YAML Policy Engine — hot-reload · <1ms evaluation · 6 action types
Live Policy Evaluation
📤 Upload YAML Policy
Automated coverage derived from deployed PGE policies · 15 active policies
NIST AI RMF
Full lifecycle AI risk governance
SOX Compliance
Financial AI dual-approval controls
HIPAA
PHI shadow-routing to local model
GDPR / EU Privacy
Cross-border data transfer blocks
EU AI Act
High-risk AI system controls
CMMC 2.0
DoD supply chain model controls
Overall Compliance Score
Weighted average across 6 regulatory frameworks
78%
26 controls mapped
🇪🇺 EU AI Act — Article-Level Mapping
Regulation EU 2024/1689 · 12 articles assessed
Dragon decisions requiring human review before execution
✅
No pending escalations
Dragon policies have not flagged any decisions requiring human review
Escalations appear here when Dragon PGE fires an ESCALATE_TO_HUMAN policy action
Every AI model, agent, API, and connector in your estate · Shadow AI detection
✅ No shadow AI detected
Register AI assets via POST /api/visibility/assets/register
AI agent tool call governance · Kill switch · Full audit log
🤖
No agent sessions yet
Sessions appear when AI agents call POST /api/mcp/intercept
Scan AI endpoints for misconfigurations · TLS · Auth · CORS · Rate limiting · Dragon coverage
No scans yet. Enter an AI endpoint URL above and click Scan.
54 attack payloads · Prompt injection · Jailbreak · PII exfil · System leak · Credentials
🎯
No scans yet
Enter an AI endpoint URL above — we send 54 attack payloads and score vulnerability
Auto-detects: repeated gate failures · high MCP block rate · KlynxChip crisis mode
🛡
No incidents detected
Click Run Detection to scan for anomalies across Dragon, MCP Gateway, and KlynxChip
Detect unauthorized AI tool usage across your org — ungoverned ChatGPT, Claude, Copilot, Gemini
👤
No shadow AI data yet
Connect your proxy or network gateway to start reporting AI tool usage via POST /api/shadow/report
Per-org, per-model token/cost limits. Dragon blocks requests when limits are exceeded.
💰
No budget data yet
Set budgets via POST /api/budget/set and record usage via POST /api/budget/record
Real-time detection of role overrides, jailbreaks, indirect injection, and data exfiltration attempts
🛡
No scan data yet
Send prompts via POST /api/shield/scan
Auto-redact PII, PHI, API keys, credentials from AI inputs — GDPR / HIPAA compliance layer
👻
No masking data yet
Call POST /api/ghost/mask before sending user input to any LLM
Encrypted storage for API keys, model credentials, system prompts. Every access logged.
🔑
No secrets stored yet
Store API keys and credentials via POST /api/vault/secrets
Auto-generate SOC2 / EU AI Act / ISO 42001 / HIPAA / CMMC audit reports from live Klynx data
Real-time model health — auto-opens when failure rate exceeds threshold
No circuit data yet — circuits are created on first LLM call
Parallel LLM evaluation — Dragon picks the safest, highest-quality response
No consensus evaluations yet — call POST /api/consensus/evaluate
Claude-generated executive summary of platform activity, risks, and wins
Click "Generate Now" to create an AI-powered executive digest
Test Dragon policies in sandbox — validate before deploying to production
Weighted 0-100 score across security, reliability, compliance, and governance
Health score is computed from live module data — loading…
Statistical profiling of AI usage — flags prompt spikes, unusual hours, burst traffic, model switches
No baseline data yet — events are recorded via POST /api/baseline/event
Loading marketplace policies…
📣 Social Publisher
Generate a post from a brief — Claude drafts, you approve before publishing.
No pending drafts. Write a brief above to generate your first post.