AI that cannot move money without a human.
Every workflow requires explicit approval. Every action is immutably logged. The system is architecturally constrained, not just policy-constrained.
The execution boundary every action passes through.
Every agent output surfaces as a structured Action Card. Officers review the evidence, the policy citation, and the proposed action before any execution occurs.
Client
Meridian Holdings Ltd
Risk Tier
HIGH
Client ID
CLT-00482
Review Type
Enhanced Due Diligence
Policy Citation
GFSC AML Regulations 2024 · Schedule 5, §4(b): "Where a customer presents politically exposed person indicators combined with cross-border beneficial ownership structures, the firm must apply enhanced due diligence measures and obtain senior management approval before establishing or continuing the business relationship."
Proposed Action: Draft Communication
"Dear Mr. Castellano, further to our ongoing KYC review, we are required under GFSC Schedule 5 §4(b) to request additional documentation confirming the ultimate beneficial ownership structure of Meridian Holdings Ltd. Please provide certified copies of the ownership register and a declaration from each beneficial owner holding ≥25% equity within 10 business days..."
No autonomous writes
The system cannot execute the proposed action without an authenticated officer approval event.
Full evidence chain
Every field on the card cites its exact data source: the Vault query and the Atlas vector retrieval.
Immutable on approval
Once approved, the card and its approval token are written immutably to the audit log.
Permissions scoped by role, not by trust.
| Capability | Analyst | Manager | Admin |
|---|---|---|---|
| View Action Card | |||
| Approve Action Card | |||
| Reject Action Card | |||
| Query Vault (read-only) | |||
| Upload Policy to Atlas | |||
| Create Workflow Template | |||
| Export Audit Pack | |||
| Manage User Roles | |||
| Configure LLM Routing |
Every inference step is on record.
The log below is a real-format sample of the event stream generated during a single EDD session. Each entry is append-only and tamper-evident.