Protected by JAK ShieldBeta 0.1.0-beta.0· Closed-loop company operating layer

Turn company contextinto approvedagent work.

JAK captures evidence from docs, tickets, code, meetings, and customer feedback; maps decisions, tasks, risks, owners, deadlines, and code changes; detects execution drift; generates specs; then routes work through OpenAI-first agents with permissions, approvals, sandboxing, risk scoring, defensive security review, and tamper-evident audit trails.

Evidence GraphDrift DetectionExecutable SpecsApprovalsJAK ShieldAudit Trail

Open-source repos: JAK Swarm (control plane) + JAK Shield (trust layer)

Controlled beta · free for 30 days · daily caps to protect your budget · no credit card required

JAK Cockpit · Workflow #847
running
>
Company Brain
Drift Detector
Spec Generator

Live preview of the cockpit · same surface every workflow runs through

Why this matters

Scattered context creates drift. JAK closes the loop.

The goal is not another dashboard or another chatbot. The goal is an evidence-backed execution layer that knows what the company meant, what the team is doing, and what needs approval before agents act.

Company context is scattered

Meetings, tickets, GitHub, Slack, Notion, support, emails, and customer calls all hold different pieces of the truth. AI cannot reason well when the evidence is fragmented.

How JAK fixes it

JAK starts with source-labeled artifacts and graph entities, so agents work from cited company evidence instead of vibes.

Teams drift from customer intent

Roadmaps often say one thing, customer pain says another, and code activity can quietly move in a third direction. That gap is where teams waste sprints.

How JAK fixes it

JAK compares signals, decisions, tasks, specs, and code-change evidence, then flags drift before it becomes expensive.

Agents need a trust boundary

A system that can create specs, touch code, send messages, or operate tools must show evidence, ask approval, and leave a record.

How JAK fixes it

JAK Shield puts risky tool calls behind permissions, approvals, sandboxing, risk scoring, defensive review, and tamper-evident audit trails.

The YC wedge

Product and engineering alignment, closed loop.

JAK is not claiming to be a finished all-company AI OS today. The honest beta wedge is sharper: make product and engineering context legible to AI, detect drift, generate executable specs, and gate action through JAK Shield.

Company memory

Evidence first, not chatbot memory.

JAK stores source-labeled artifacts from docs, tickets, code, meetings, customer calls, support, Slack, Notion, Linear/Jira, GitHub, Gmail, or manual notes. It then extracts decisions, tasks, risks, owners, deadlines, customer signals, and code changes with citations.

  • Artifacts are tenant-scoped and body-hashed
  • Entities cite the artifacts they came from
  • Connector sync is setup-dependent; manual evidence already works
Evidence: /company/artifacts + /company/entities

Execution drift

Compare what is happening with what should happen.

The alignment engine looks for customer pain without matching work, decisions that never became tasks, execution that has no supporting decision, and stale high-priority tasks. It is a deterministic comparator, not a vague LLM opinion.

  • Flags unaddressed customer signals
  • Finds decisions that were not operationalized
  • Marks ungrounded execution and stale work
Evidence: buildDriftCandidates()

Agent-executable specs

Turn drift into approved work.

When drift is found, JAK can generate an OpenAI-backed execution spec with objective, scope, acceptance criteria, test plan, agent task plan, approval gates, and cited evidence. A reviewer approves or rejects it before the team treats it as executable.

  • No template fallback for spec generation
  • Acceptance criteria and test plans are explicit
  • Reviewer approval is a real backend decision route
Evidence: /company/specs/generate + decide
Blunt beta truth: JAK has the Company OS data model, API routes, dashboard surface, deterministic drift detector, OpenAI spec generator, approval decision route, and audit foundation. It still needs deeper connector auto-sync before the landing page should claim full company-wide OS coverage.

How It Works

Seven steps from intent to delivered work.

Every JAK workflow runs the same pipeline. You see every step. You gate every risky one. You can replay every run.

  1. 1
    Command

    You type a task in plain English. No syntax, no flags, no special prompt format.

    commander.parses(intent)
  2. 2
    Plan

    JAK breaks the task into ordered steps you can review before anything runs.

    planner.decompose() → 4 steps
  3. 3
    Route

    Each step goes to the right specialist agent — research, content, code, ops, design.

    router.assign(task → CMO / CTO / Research)
  4. 4
    Execute

    Specialists run with your connected tools — Gmail, Slack, GitHub, Notion, the browser.

    worker.run() · live in cockpit
  5. 5
    Approve

    Anything risky pauses for you. Inline card shows tool, payload, files, expected result.

    approval.gate(payload-bound)
  6. 6
    Verify

    JAK checks the work — citations, tone, safety, hallucination, payload integrity.

    verifier.check() · 4-layer
  7. 7
    Deliver

    Final output, signed audit trail, replayable run. Ready to ship — or reuse next time.

    output.deliver() · audit.signed

The Cockpit

Every workflow, one operating surface.

Your command on the left. The agent graph in the middle. The approval card and the result on the right. The audit on the bottom. One place to run, gate, and prove the work.

JAK Cockpit · /workspace
awaiting approval

Your command

Compare customer feedback with this sprint and generate the execution spec

sent 12s ago · workflow #847

Recent runs

  • Customer signal drift · 3 findings
  • Onboarding spec · approved
  • Evidence pack · exported

Agent graph · live

4/5 done · 1 running
Commander
Company Brain
Signals
Sprint
Drift
Verifier
done running queued
Approval required
toolagent_spec_approvalpayloadspec + test planreplay-safepayload-bound ✓
Spec preview · acceptance criteria

“Objective: reduce onboarding drop-off. Evidence: customer calls and GitHub issues. Acceptance criteria: guided import, empty-state copy, Playwright regression, rollout approval…”

Audit timeline · run #847
HMAC-SHA256 · every step replayable
  1. 00:00Workflow #847 started
  2. 00:02Evidence artifacts loaded
  3. 00:05Customer signals extracted
  4. 00:08Sprint work compared
  5. 00:12Drift finding · high
  6. Spec approval · awaiting

What JAK actually ships

Evidence-backed artifacts, not chat output.

Every workflow should end in something concrete: a drift brief, an execution spec, a QA report, or an audit pack. Approval-gated where it matters, signed where it’s required, reversible where it’s risky.

Execution drift brief

Compares customer signals, decisions, tasks, specs, and code-change evidence, then explains where execution is drifting from intent.

customer_signal_unaddresseddecision_not_operationalizedungrounded_execution
  • ·Onboarding pain lacks matching sprint work [evidence: call_6, issue_14]
  • ·Founder decision has no task owner [evidence: note_3]
  • ·Recent code change lacks a cited spec [evidence: commit_9]
Deterministic driftCited artifacts

Agent-executable product spec

Turns a drift finding or selected entities into a spec with objective, acceptance criteria, test plan, agent task plan, approval gates, and evidence citations.

“Fix onboarding activation gap with guided import, empty-state copy, and regression coverage.”

  • [1] Acceptance criteria: 4
  • [2] Playwright test plan: required
  • [3] Approval gates: product owner + rollout
OpenAI requiredReviewer decision route

Browser QA + source-linked fixes

Uses browser automation to inspect pages, capture evidence, and report issues with source-file pointers or sandbox-only fixes when the repo is available.

  • [1]apps/web/.../page.tsx · hero CTA contrast
  • [2]components/Pricing.tsx · mobile tap target
  • [3]app/layout.tsx · meta description < 50 chars
  • + screenshot evidence · sandbox-only until you approve
Source-file pointersSandbox-only edits

Audit-ready evidence pack

Every workflow step can land in a tamper-evident audit log. When an enterprise asks, JAK exports a HMAC-SHA256-signed evidence bundle that verifies byte-for-byte. Compliance controls are seeded; not all are automatically evidenced.

Bundle verified
runs847, 846, 845controls108 operational · 74 attestationsignaturehmac:7a4c…f0d2 ✓
HMAC-SHA256 signedReplay-safe approval

Trust Layer

Built for controlled autonomy.

Six guarantees, every one wired into the runtime. Not policies. Not promises. Code paths reviewers can grep.

Human approval gates

Every external action — send, post, deploy, charge — pauses for an inline approval card. Replays with a different payload are rejected.

approval-node.ts · payload-bound

Source-grounded outputs

Research-class agents must cite. The verifier flags any claim under the citation-density threshold before delivery.

verifier.agent.ts · density ≥ 0.7

Tool maturity labels

Every tool carries an honest CI-enforced label: real, heuristic, llm_passthrough, config_dependent, or experimental. No tool ships unlabeled.

check:truth · 122 / 0 unclassified

Tamper-evident audit trail

Every workflow run, every approval decision, every external action emits an audit log row. Final evidence packs are HMAC-SHA256 signed.

audit-log plugin · bundle.service.ts

Self-hostable open-source core

JAK is MIT-licensed. Run it on your laptop, your VPS, or your cluster. Hosted ops are a convenience, not a lock-in.

github.com/inbharatai/jak-swarm · MIT

OpenAI-first runtime

JAK is OpenAI-only for model execution, with GPT-5.5/5.4-family tier routing and Responses API support for structured orchestration. No alternate LLM provider fallback is used.

openai-runtime.ts · provider-router.ts

JAK Shield

AI agents are powerful. JAK Shield makes them safe.

Before an agent touches your code, browser, files, email, GitHub, or business tools, JAK Shield checks permissions, scores risk, blocks unsafe actions, asks for approval where needed, and records every step in a tamper-evident evidence bundle.

Agent Firewall

Detects prompt-injection attacks and offensive-cyber requests (malware, exploits, credential theft, unauthorized scanning, phishing) BEFORE the LLM sees them. Defensive security work — audit my repo, harden auth, find CVEs — passes through.

packages/security/src/guardrails/offensive-cyber-detector.ts

Risk-Based Approvals

Every tool call is classified across 6 risk tiers — READ_ONLY through CRITICAL_MANUAL_ONLY. Risky calls pause the workflow. Approval is bound to the exact payload via a SHA-256 hash; replays with modified payloads are rejected with HTTP 409.

packages/tools/src/registry/approval-policy.ts

Secure Tool Permissions

Per-tenant tool registry + industry-pack restrictions + Standing Orders (allowed-tools whitelist + blocked-actions list + budget cap + expiry). REVIEWER+ role required to install or run anything destructive.

packages/tools/src/registry/tenant-tool-registry.ts

Sandboxed Execution

Browser sessions in per-tenant data dirs (500 MB quota), URL allowlist with cloud-metadata + RFC1918 + IPv6 link-local blocked, DNS-rebinding defense on every navigation, downloads disabled. Installer runs in a sandboxed subprocess with literal argv (never shell:true), 60s timeout, stripped env.

packages/tools/src/browser-operator/playwright-browser-operator.ts

Defensive Vulnerability Triage

JAK Shield supports defensive security work — repo audits, dependency scans, secret-leak detection, patch recommendations. Offensive work (writing exploits, generating malware, phishing kits) is blocked at the boundary.

docs/jak-shield-manifest.md

Audit Evidence Layer

Every workflow lifecycle event lands in AuditLog. AgentTrace fields are PII-redacted at write time. workflows.{goal,error,finalOutput,planJson,stateJson} are AES-256-GCM encrypted at rest. Final evidence bundles are HMAC-SHA256 signed and verify byte-for-byte.

apps/api/src/services/bundle.service.ts

Safety boundary

JAK Shield is built for defensive security, safe automation, permissioned workflows, and audit-ready agent execution. It does not support offensive hacking, malware generation, credential theft, phishing, unauthorized scanning, or exploit generation. Defensive work is allowed. Offensive work is refused.

When you need audit-grade

Enterprise-grade auditability when you need it.

You don’t need to think about SOC 2 on day one. Every workflow JAK runs is already tamper-evident, signed, and replayable — so when an enterprise customer asks, the evidence is already there.

63SOC 2 Type 237HIPAA Security Rule82ISO/IEC 27001:2022

182 controls seeded across three frameworks — 108 are operationally backed (evidence pulled from system activity) and 74 require reviewer attestation. LLM-driven control testing, reviewer-gated workpaper PDFs, HMAC-signed final evidence packs.

Open Audit Workspace
  • Reviewer-gated workpaper PDFs — download blocked until approved
  • Final-pack signing refuses if any workpaper is unapproved (FinalPackGateError)
  • External Auditor Portal — invite-token-only, engagement-scoped, fully audited
  • HMAC-SHA256 evidence bundles verify byte-for-byte

Pricing

Transparent pricing. Open-source core.

Run JAK free on your own infrastructure, forever. Upgrade when you want hosted OpenAI ops, higher limits, and SLA.

Free

$0forever

Run JAK on your own machine, forever.

  • 200 credits / month
  • 30 credits / day
  • 5 core agents
  • 1 vibe coding project
  • Bring-your-own OpenAI key
  • Community support
Most Popular

Pro

$29/mo

Hosted runtime, OpenAI managed, approvals built in.

  • 3,000 credits / month
  • 200 credits / day
  • All 38 specialist agents
  • 5 vibe coding projects
  • Managed OpenAI runtime (GPT-5.4 tier)
  • 500 premium credits
  • Email support

Team

$99/mo

Higher limits and priority model access for teams.

  • 15,000 credits / month
  • 600 credits / day
  • All agents + custom skills
  • Unlimited projects
  • 3,000 premium credits
  • Managed OpenAI runtime
  • Priority support

Enterprise

$249/mo

SSO, audit exports, and dedicated deployment.

  • 50,000 credits / month
  • 2,000 credits / day
  • 15,000 premium credits
  • SSO + RBAC + audit logs
  • Custom integrations
  • Managed OpenAI runtime
  • Dedicated support
38
Specialist Agents
122
Classified Tools
20+
Connectors
MIT
Open Source

Turn scattered context
into controlled execution.

Start with the honest beta wedge: company evidence, drift detection, executable specs, approval gates, and audit trails. Open-source core. Self-hostable. OpenAI-first runtime.

Free to start · No credit card · MIT licensed · Self-host or cloud