Hearth Insights | Provable Compliance & Sovereign Control Logo

Hearth Insights

PLATFORM OVERVIEW

The Blackboard Architecture

Redis-backed orchestration. Complete audit trail. Zero data leakage.

SYSTEM ARCHITECTURE

The 12-Step Workflow

graph TD User([fa:fa-user Authorised Operator]) -- "1. Operator commits intent" --> CLI(fa:fa-terminal The Airlock) subgraph SecurePerimeter ["πŸ”’ The Air-Gap"] subgraph ControlPlane ["Control & Data Plane"] direction TB subgraph Blackboard [fa:fa-database The Event Ledger] direction TB Artefacts("fa:fa-file-alt Artefacts") Claims("fa:fa-check-square Claims") Bids("fa:fa-gavel Bids") end Orchestrator(fa:fa-sitemap The Governor) end subgraph ExecutionPlane ["Execution Plane"] direction TB Agents["fa:fa-users Hermetic Unit<br/>(e.g., Screener, Investigator, Adjudicator)"] Tools([fa:fa-wrench Verified Toolchain<br/>OpenSSL, Pandas, SWIFT Parser]) end CLI -- "2. Ingests Intent" --> Blackboard Blackboard -- "3. New Ingest Event" --> Orchestrator Orchestrator -- "4. Governor opens tender" --> Blackboard Blackboard -- "5. Tender details" --> Agents Agents -- "6. Units bid" --> Blackboard Orchestrator -- "7. Governor awards tender" --> Blackboard Blackboard -- "8. Notify Unit" --> Agents Agents -- "9. Executes in sealed container" --> Tools Tools -- "10. Attests Result (e.g., Signed SAR Payload)" --> Agents Agents -- "11. Attests Execution" --> Blackboard Blackboard -- "12. Loop: Next Cycle Begins..." --> Orchestrator %% Explicitly linking strut to ensure verticals %% Explicitly link Control Plane bottom to Execution Plane top to force stacking Orchestrator ~~~ Agents end classDef core fill:#ffffff,stroke:#13756e,color:#0f172a; classDef agent fill:#ffffff,stroke:#13756e,color:#0f172a; classDef user fill:#ffffff,stroke:#13756e,color:#0f172a; classDef data fill:#1e293b,stroke:#94a3b8,color:#e2e8f0; classDef perimeter fill:none,stroke:#64748b,stroke-width:2px,stroke-dasharray:5 5; classDef plane fill:#e2e8f0,stroke:none,color:#94a3b8; class Orchestrator,Blackboard core; class Agents agent; class User,CLI user; class Tools,Artefacts,Claims,Bids data; class SecurePerimeter perimeter; class ControlPlane,ExecutionPlane plane;

THE FORENSIC LOOP

  • Ingest: The Authorised Operator commits a goal via The Airlock.
  • Tender: The Governor posts the task to The Event Ledger.
  • Bid: Hermetic Units compete for the work.
  • Execute: The winner executes in a sealed container using a Verified Toolchain.
  • Attest: The result is hashed and written back to the Ledger. No side effects. No hidden logs.
KEY COMPONENTS

The Three Layers

CONTROL PLANE Redis Blackboard

Chronological ledger storing artefacts, claims, and bids. Append-only for complete audit trail. Every decision traced to source.

EXECUTION PLANE Hermetic Units

Docker-isolated agents bid for work. Execute with tools (Git, linters, etc.). Commit results with cryptographic signatures.

AUDIT TRAIL Provable Compliance

Complete history in Redis + Git. Every artefact timestamped. Every claim logged. When the regulator calls, you have the answer.

LIVE AUDIT TRAIL

What happens when AI makes a mistake?

Real-time telemetry from the Holt Engine. Every ID (`d269af14`) represents a cryptographically hashed artefact, ensuring the chain of custody is unbreakable. In this workflow, a Terraform module was generated. The first version failed code reviewβ€”TfLint rejected it for linting errors. The orchestrator automatically assigned rework to the drafter. Version 2 passed all checks. This is quality control at machine speed.

[16:10:00.484] ✨ Artefact created: by=user, type=GoalDefined, id=55b62e13
[16:10:00.492] ⏳ Claim created: claim=d644be91, artefact=55b62e13, status=pending_review
[16:10:00.510] πŸ™‹ Bid submitted: agent=ModulePackager, claim=d644be91, type=ignore
[16:10:00.510] πŸ™‹ Bid submitted: agent=TerraformDrafter, claim=d644be91, type=exclusive
[16:10:00.511] πŸ™‹ Bid submitted: agent=DocGenerator, claim=d644be91, type=ignore
[16:10:00.511] πŸ™‹ Bid submitted: agent=TerraformFmt, claim=d644be91, type=ignore
[16:10:00.511] πŸ™‹ Bid submitted: agent=MarkdownLint, claim=d644be91, type=ignore
[16:10:00.511] πŸ™‹ Bid submitted: agent=TfLint, claim=d644be91, type=ignore
[16:10:00.599] πŸ† Claim granted: agent=TerraformDrafter@efda51e46f4a, claim=d644be91, type=exclusive
[16:10:08.803] ✨ Artefact created: by=TerraformDrafter, type=TerraformCode, id=d269af14
[16:10:08.806] ⏳ Claim created: claim=0a18c6a5, artefact=d269af14, status=pending_review
[16:10:08.811] πŸ™‹ Bid submitted: agent=DocGenerator, claim=0a18c6a5, type=exclusive
[16:10:08.811] πŸ™‹ Bid submitted: agent=MarkdownLint, claim=0a18c6a5, type=ignore
[16:10:08.811] πŸ™‹ Bid submitted: agent=TerraformDrafter, claim=0a18c6a5, type=ignore
[16:10:08.811] πŸ™‹ Bid submitted: agent=ModulePackager, claim=0a18c6a5, type=ignore
[16:10:08.811] πŸ™‹ Bid submitted: agent=TerraformFmt, claim=0a18c6a5, type=review
[16:10:08.811] πŸ™‹ Bid submitted: agent=TfLint, claim=0a18c6a5, type=review
[16:10:08.912] πŸ† Claim granted: agent=TerraformFmt@5fcb69cef1a3, claim=0a18c6a5, type=review
[16:10:08.912] πŸ† Claim granted: agent=TfLint@c23d2306a1eb, claim=0a18c6a5, type=review
[16:10:09.469] ❌ Review Rejected: by=TfLint for artefact d269af14 (review: c5ea0615)
[16:10:09.470] βœ… Review Approved: by=TerraformFmt for artefact d269af14 (review: a00f8b34)
[16:10:09.470] ⏳ Claim created: claim=bec605a4, artefact=d269af14, status=pending_assignment
[16:10:09.470] πŸ”„ Rework Assigned: to=TerraformDrafter for claim bec605a4 (iteration 1)
[16:10:12.096] πŸ”„ Artefact Reworked (v2): by=TerraformDrafter, type=TerraformCode, id=8baa06c1
[16:10:12.097] ⏳ Claim created: claim=66646975, artefact=8baa06c1, status=pending_review
[16:10:12.101] πŸ™‹ Bid submitted: agent=ModulePackager, claim=66646975, type=ignore
[16:10:12.101] πŸ™‹ Bid submitted: agent=DocGenerator, claim=66646975, type=exclusive
[16:10:12.102] πŸ™‹ Bid submitted: agent=TerraformFmt, claim=66646975, type=review
[16:10:12.102] πŸ™‹ Bid submitted: agent=TfLint, claim=66646975, type=review
[16:10:12.102] πŸ™‹ Bid submitted: agent=MarkdownLint, claim=66646975, type=ignore
[16:10:12.103] πŸ™‹ Bid submitted: agent=TerraformDrafter, claim=66646975, type=ignore
[16:10:12.203] πŸ† Claim granted: agent=TfLint@c23d2306a1eb, claim=66646975, type=review
[16:10:12.203] πŸ† Claim granted: agent=TerraformFmt@5fcb69cef1a3, claim=66646975, type=review
[16:10:12.702] βœ… Review Approved: by=TerraformFmt for artefact 8baa06c1 (review: d58defc4)
[16:10:12.702] βœ… Review Approved: by=TfLint for artefact 8baa06c1 (review: 7fd3b591)
[16:10:12.704] πŸ† Claim granted: agent=DocGenerator@23c97dca5bd9, claim=66646975, type=exclusive
[16:10:22.206] ✨ Artefact created: by=DocGenerator, type=TerraformDocumentation, id=284fb399
[16:10:22.210] ⏳ Claim created: claim=2e7f2e23, artefact=284fb399, status=pending_review
[16:10:22.217] πŸ™‹ Bid submitted: agent=MarkdownLint, claim=2e7f2e23, type=claim
[16:10:22.217] πŸ™‹ Bid submitted: agent=TerraformDrafter, claim=2e7f2e23, type=ignore
[16:10:22.217] πŸ™‹ Bid submitted: agent=TerraformFmt, claim=2e7f2e23, type=ignore
[16:10:22.217] πŸ™‹ Bid submitted: agent=TfLint, claim=2e7f2e23, type=ignore
[16:10:22.217] πŸ™‹ Bid submitted: agent=ModulePackager, claim=2e7f2e23, type=ignore
[16:10:22.219] πŸ™‹ Bid submitted: agent=DocGenerator, claim=2e7f2e23, type=ignore
[16:10:22.314] πŸ† Claim granted: agent=MarkdownLint@9aa0b4fda409, claim=2e7f2e23, type=claim
[16:10:22.436] ✨ Artefact created: by=MarkdownLint, type=FormattedDocumentation, id=8d269403
[16:10:22.439] ⏳ Claim created: claim=9a05d128, artefact=8d269403, status=pending_review
[16:10:22.445] πŸ™‹ Bid submitted: agent=ModulePackager, claim=9a05d128, type=exclusive
[16:10:22.445] πŸ™‹ Bid submitted: agent=DocGenerator, claim=9a05d128, type=ignore
[16:10:22.445] πŸ™‹ Bid submitted: agent=TerraformFmt, claim=9a05d128, type=ignore
[16:10:22.446] πŸ™‹ Bid submitted: agent=TfLint, claim=9a05d128, type=ignore
[16:10:22.446] πŸ™‹ Bid submitted: agent=TerraformDrafter, claim=9a05d128, type=ignore
[16:10:22.446] πŸ™‹ Bid submitted: agent=MarkdownLint, claim=9a05d128, type=ignore
[16:10:22.545] πŸ† Claim granted: agent=ModulePackager@b79beed7da4e, claim=9a05d128, type=exclusive
[16:10:22.584] ✨ Artefact created: by=ModulePackager, type=PackagedModule, id=dbc19d98
[16:10:22.584] πŸŽ‰ Workflow completed: Terminal artefact created (type=PackagedModule, id=dbc19d98)

Forensic Replay: Because this log is an append-only ledger, an auditor can mathematically reconstruct the exact state of the system at 16:10:09 to prove why the Reviewer Unit rejected the initial draft.

Total time: 22 seconds from goal to packaged module

THE QUALITY GATE (CONTROL 3.1) Policy Enforcement

TfLint blocked deployment at 16:10:09.469. No automatic approval. Quality gates enforced before any code is committed. This proves your controls exist, not just documented.

THE AUDIT TRAIL (ARTICLE 14) Non-Repudiation

The rework cycle (v1 β†’ v2) is preserved, not overwritten. Artefact `d269af14` rejected. Artefact `8baa06c1` approved. The system cannot erase its mistakes. This proves accountability.

THE EVIDENCE (FINAL GRANT) Deterministic Execution

DocGenerator only ran after both reviewers approved. Approval at 16:10:12.702 triggered documentation at 16:10:22.206. When the regulator asks 'how do you know this is correct?' you have cryptographic proof.

POLICY AS CODE

The Specialist Pattern

version: "1.0"

agents:
  # Unit A: The High-Frequency Spotter
  # focus: rapid detection of small, linked transactions
  aml-placement-unit-04:
    image: "hearth/smurfing-detector@sha256:7a8b..."
    bidding_strategy: 
      type: "exclusive"
      target_types:
        - "aml.alert.structuring_detected" # Logic: "Is this $9,000 sent 4 times?"
    environment:
      - "LOOKBACK_WINDOW=24h"

  # Unit B: The Deep-Dive Investigator
  # focus: complex graph analysis of shell companies
  aml-layering-unit-09:
    image: "hearth/graph-analyser@sha256:3c2d..."
    # The Evidence Locker
    # We grant this agent access to transacton histories
    # Crucially, we mount it Read-Only (:ro). It can analyse the past, but it cannot rewrite it.
    volumes:
      - "/secure/swift-archives-v2:/data/history:ro"
    bidding_strategy: 
      type: "exclusive"
      target_types:
        - "aml.alert.layering_suspected" # Logic: "Is this money moving through 3 jurisdictions?"
    environment:
      - "GRAPH_DEPTH=5"

Don't just orchestrate, govern.

In the configuration above, we enforce a strict separation of concerns. The placement-unit is bound to "structuring" alerts; the layering-unit is restricted to Read-Only access.

The agent does not "choose" to comply. The platform enforces the logic. The placement-unit will never see a task it isn't configured for. The layering-unit cannot alter the archives.

The AI cannot hallucinate a permission that does not exist. Security is not a guideline, it is architecture.

THE EVIDENCE GAP

The Difference is Forensic

Most orchestration tools optimize for speed. Holt optimizes for proof.

Feature Standard CI/CD / Agents Holt Blackboard Architecture
The Log Ephemeral text stream (Splunk/CloudWatch) Immutable Event Ledger (Redis)
The Data Piped to external SaaS clouds Zero Egress (Your VPC Only)
The Payload Opaque Containers (Black Box) Hermetic & Signed (Images & Binaries)
The Audit "Trust us, it ran." "Here is the cryptographic proof."

Ready to see it in action?

Request a demo to see how Holt transforms AI from a compliance risk into a strategic asset.