JAK captures evidence from docs, tickets, code, meetings, and customer feedback; maps decisions, tasks, risks, owners, deadlines, and code changes; detects execution drift; generates specs; then routes work through OpenAI-first agents with permissions, approvals, sandboxing, risk scoring, defensive security review, and tamper-evident audit trails.
Live preview of the cockpit · same surface every workflow runs through
Why this matters
Scattered context creates drift. JAK closes the loop.
The goal is not another dashboard or another chatbot. The goal is an evidence-backed execution layer that knows what the company meant, what the team is doing, and what needs approval before agents act.
Company context is scattered
Meetings, tickets, GitHub, Slack, Notion, support, emails, and customer calls all hold different pieces of the truth. AI cannot reason well when the evidence is fragmented.
How JAK fixes it
JAK starts with source-labeled artifacts and graph entities, so agents work from cited company evidence instead of vibes.
Teams drift from customer intent
Roadmaps often say one thing, customer pain says another, and code activity can quietly move in a third direction. That gap is where teams waste sprints.
How JAK fixes it
JAK compares signals, decisions, tasks, specs, and code-change evidence, then flags drift before it becomes expensive.
Agents need a trust boundary
A system that can create specs, touch code, send messages, or operate tools must show evidence, ask approval, and leave a record.
How JAK fixes it
JAK Shield puts risky tool calls behind permissions, approvals, sandboxing, risk scoring, defensive review, and tamper-evident audit trails.
The YC wedge
Product and engineering alignment, closed loop.
JAK is not claiming to be a finished all-company AI OS today. The honest beta wedge is sharper: make product and engineering context legible to AI, detect drift, generate executable specs, and gate action through JAK Shield.
Company memory
Evidence first, not chatbot memory.
JAK stores source-labeled artifacts from docs, tickets, code, meetings, customer calls, support, Slack, Notion, Linear/Jira, GitHub, Gmail, or manual notes. It then extracts decisions, tasks, risks, owners, deadlines, customer signals, and code changes with citations.
Artifacts are tenant-scoped and body-hashed
Entities cite the artifacts they came from
Connector sync is setup-dependent; manual evidence already works
Evidence: /company/artifacts + /company/entities
Execution drift
Compare what is happening with what should happen.
The alignment engine looks for customer pain without matching work, decisions that never became tasks, execution that has no supporting decision, and stale high-priority tasks. It is a deterministic comparator, not a vague LLM opinion.
Flags unaddressed customer signals
Finds decisions that were not operationalized
Marks ungrounded execution and stale work
Evidence: buildDriftCandidates()
Agent-executable specs
Turn drift into approved work.
When drift is found, JAK can generate an OpenAI-backed execution spec with objective, scope, acceptance criteria, test plan, agent task plan, approval gates, and cited evidence. A reviewer approves or rejects it before the team treats it as executable.
No template fallback for spec generation
Acceptance criteria and test plans are explicit
Reviewer approval is a real backend decision route
Evidence: /company/specs/generate + decide
Blunt beta truth: JAK has the Company OS data model, API routes, dashboard surface, deterministic drift detector, OpenAI spec generator, approval decision route, and audit foundation. It still needs deeper connector auto-sync before the landing page should claim full company-wide OS coverage.
How It Works
Seven steps from intent to delivered work.
Every JAK workflow runs the same pipeline. You see every step. You gate every risky one. You can replay every run.
1
Command
You type a task in plain English. No syntax, no flags, no special prompt format.
commander.parses(intent)
2
Plan
JAK breaks the task into ordered steps you can review before anything runs.
planner.decompose() → 4 steps
3
Route
Each step goes to the right specialist agent — research, content, code, ops, design.
router.assign(task → CMO / CTO / Research)
4
Execute
Specialists run with your connected tools — Gmail, Slack, GitHub, Notion, the browser.
JAK checks the work — citations, tone, safety, hallucination, payload integrity.
verifier.check() · 4-layer
7
Deliver
Final output, signed audit trail, replayable run. Ready to ship — or reuse next time.
output.deliver() · audit.signed
The Cockpit
Every workflow, one operating surface.
Your command on the left. The agent graph in the middle. The approval card and the result on the right. The audit on the bottom. One place to run, gate, and prove the work.
JAK Cockpit · /workspace
awaiting approval
Your command
Compare customer feedback with this sprint and generate the execution spec
sent 12s ago · workflow #847
Recent runs
Customer signal drift · 3 findings
Onboarding spec · approved
Evidence pack · exported
Agent graph · live
4/5 done · 1 running
Commander
Company Brain
Signals
Sprint
Drift
Verifier
done running queued
Approval required
toolagent_spec_approvalpayloadspec + test planreplay-safepayload-bound ✓
Every workflow should end in something concrete: a drift brief, an execution spec, a QA report, or an audit pack. Approval-gated where it matters, signed where it’s required, reversible where it’s risky.
Execution drift brief
Compares customer signals, decisions, tasks, specs, and code-change evidence, then explains where execution is drifting from intent.
·Onboarding pain lacks matching sprint work [evidence: call_6, issue_14]
·Founder decision has no task owner [evidence: note_3]
·Recent code change lacks a cited spec [evidence: commit_9]
Deterministic driftCited artifacts
Agent-executable product spec
Turns a drift finding or selected entities into a spec with objective, acceptance criteria, test plan, agent task plan, approval gates, and evidence citations.
“Fix onboarding activation gap with guided import, empty-state copy, and regression coverage.”
[1] Acceptance criteria: 4
[2] Playwright test plan: required
[3] Approval gates: product owner + rollout
OpenAI requiredReviewer decision route
Browser QA + source-linked fixes
Uses browser automation to inspect pages, capture evidence, and report issues with source-file pointers or sandbox-only fixes when the repo is available.
[1]apps/web/.../page.tsx · hero CTA contrast
[2]components/Pricing.tsx · mobile tap target
[3]app/layout.tsx · meta description < 50 chars
+ screenshot evidence · sandbox-only until you approve
Source-file pointersSandbox-only edits
Audit-ready evidence pack
Every workflow step can land in a tamper-evident audit log. When an enterprise asks, JAK exports a HMAC-SHA256-signed evidence bundle that verifies byte-for-byte. Compliance controls are seeded; not all are automatically evidenced.
Six guarantees, every one wired into the runtime. Not policies. Not promises. Code paths reviewers can grep.
Human approval gates
Every external action — send, post, deploy, charge — pauses for an inline approval card. Replays with a different payload are rejected.
approval-node.ts · payload-bound
Source-grounded outputs
Research-class agents must cite. The verifier flags any claim under the citation-density threshold before delivery.
verifier.agent.ts · density ≥ 0.7
Tool maturity labels
Every tool carries an honest CI-enforced label: real, heuristic, llm_passthrough, config_dependent, or experimental. No tool ships unlabeled.
check:truth · 122 / 0 unclassified
Tamper-evident audit trail
Every workflow run, every approval decision, every external action emits an audit log row. Final evidence packs are HMAC-SHA256 signed.
audit-log plugin · bundle.service.ts
Self-hostable open-source core
JAK is MIT-licensed. Run it on your laptop, your VPS, or your cluster. Hosted ops are a convenience, not a lock-in.
github.com/inbharatai/jak-swarm · MIT
OpenAI-first runtime
JAK is OpenAI-only for model execution, with GPT-5.5/5.4-family tier routing and Responses API support for structured orchestration. No alternate LLM provider fallback is used.
openai-runtime.ts · provider-router.ts
JAK Shield
AI agents are powerful. JAK Shield makes them safe.
Before an agent touches your code, browser, files, email, GitHub, or business tools, JAK Shield checks permissions, scores risk, blocks unsafe actions, asks for approval where needed, and records every step in a tamper-evident evidence bundle.
Agent Firewall
Detects prompt-injection attacks and offensive-cyber requests (malware, exploits, credential theft, unauthorized scanning, phishing) BEFORE the LLM sees them. Defensive security work — audit my repo, harden auth, find CVEs — passes through.
Every tool call is classified across 6 risk tiers — READ_ONLY through CRITICAL_MANUAL_ONLY. Risky calls pause the workflow. Approval is bound to the exact payload via a SHA-256 hash; replays with modified payloads are rejected with HTTP 409.
packages/tools/src/registry/approval-policy.ts
Secure Tool Permissions
Per-tenant tool registry + industry-pack restrictions + Standing Orders (allowed-tools whitelist + blocked-actions list + budget cap + expiry). REVIEWER+ role required to install or run anything destructive.
JAK Shield supports defensive security work — repo audits, dependency scans, secret-leak detection, patch recommendations. Offensive work (writing exploits, generating malware, phishing kits) is blocked at the boundary.
docs/jak-shield-manifest.md
Audit Evidence Layer
Every workflow lifecycle event lands in AuditLog. AgentTrace fields are PII-redacted at write time. workflows.{goal,error,finalOutput,planJson,stateJson} are AES-256-GCM encrypted at rest. Final evidence bundles are HMAC-SHA256 signed and verify byte-for-byte.
apps/api/src/services/bundle.service.ts
Safety boundary
JAK Shield is built for defensive security, safe automation, permissioned workflows, and audit-ready agent execution. It does not support offensive hacking, malware generation, credential theft, phishing, unauthorized scanning, or exploit generation. Defensive work is allowed. Offensive work is refused.
When you need audit-grade
Enterprise-grade auditability when you need it.
You don’t need to think about SOC 2 on day one. Every workflow JAK runs is already tamper-evident, signed, and replayable — so when an enterprise customer asks, the evidence is already there.
63SOC 2 Type 237HIPAA Security Rule82ISO/IEC 27001:2022
182 controls seeded across three frameworks — 108 are operationally backed (evidence pulled from system activity) and 74 require reviewer attestation. LLM-driven control testing, reviewer-gated workpaper PDFs, HMAC-signed final evidence packs.