ΔOS
Log inGet Started
How ΔOS Works

From intent to outcome, governed

ΔOS sits between agent intent and system action, rendering policy-driven judgments in milliseconds with full auditability.

The governance loop

Every agent action follows the same pattern: an intent is declared, a judgment is rendered, the action executes, the outcome is recorded, and value is quantified. ΔOS makes this loop explicit, auditable, and policy-driven.

1
IntentAgent declares what it wants to do
2
JudgmentΔOS evaluates against policies
3
ExecutionAction proceeds (or doesn't)
4
OutcomeResult is recorded and analyzed
5
ValueBusiness impact is quantified

Value quantification

ΔOS does not merely observe activity. It quantifies prevented outcomes using conservative, evidence-linked value bands. Every blocked risk, prevented incident, and hour of manual review avoided is captured with defensible methodology and full audit trails.

Learn about Value Bands

Core components

Intent Registry

A structured representation of what agents want to do. Intents capture the action type, target system, parameters, and context—everything needed to render a judgment.

  • Typed intent schemas
  • Rich metadata support
  • Domain-specific extensions

Policy Engine

Policies express your governance rules in a declarative format. They define conditions, risk thresholds, approval requirements, and escalation paths.

  • Version-controlled policies
  • Composable rule sets
  • Environment-aware evaluation

Judgment Renderer

The decision-making core. For each intent, the renderer evaluates applicable policies and produces a judgment: allow, allow with conditions, escalate, or block.

  • Sub-50ms latency
  • Deterministic evaluation
  • Full explanation chain

Audit Log

Every judgment is recorded with full context. The audit log captures what was requested, what policies applied, what decision was rendered, and what the outcome was.

  • Immutable records
  • Rich querying
  • Compliance-ready exports

Value Ledger

Quantify the business impact of governance decisions using conservative, evidence-linked value bands. See value accrued and value conservatively avoided—with ranges, confidence levels, and full audit trails.

  • Value bands with ranges
  • Confidence levels (Low/Medium/High)
  • CFO-ready exports

Integration model

ΔOS integrates via a lightweight SDK that wraps agent actions. The SDK handles intent submission, judgment retrieval, and outcome reporting with minimal code changes.

// Before: Direct action
await database.write(data);

// After: Governed action
const judgment = await deltaos.evaluate({
  action: "database.write",
  target: "production.users",
  parameters: { data },
  context: { agent: "data-sync", environment: "prod" }
});

if (judgment.allowed) {
  const result = await database.write(data);
  await deltaos.recordOutcome(judgment.id, { success: true, result });
}
TypeScriptPythonGoREST API

Integration modes

ΔOS integrations operate in three explicit modes with defined authority boundaries.

Evidence-Only (Read-Only)

Observes activity. No execution rights. Zero blast radius.

GitHub read access
CloudTrail ingestion
SIEM queries

ΔOS sees what happens but cannot act.

Governed Interaction

Approvals, ticketing, notifications. Human-in-the-loop.

Jira ticket creation
Slack notifications
ServiceNow approvals

ΔOS facilitates workflow but humans decide.

Governed Execution

Actions permitted only through ΔOS authority. Idempotent. Reversible. Audited.

Terraform apply
Kubernetes deploy
Database migration

ΔOS authorizes action. Every execution is auditable and reversible.

Your first 30 days

A structured path from observation to earned autonomy.

Week 1

Observe

  • Read-only integrations
  • Evidence ingestion
  • No execution

Baseline visibility into agent activity.

Week 2

Govern

  • Approvals activated
  • Policy blocks enforced
  • Human overrides enabled

Active governance without execution risk.

Week 3–4

Earn Trust

  • Trust tier progression
  • Limited execution enabled
  • Value bands appear

Quantified value with earned autonomy.

Trust tiers

Not all actions carry the same risk. ΔOS evaluates actions across trust tiers, with different governance requirements at each level.

T0

Read-only

Observational actions with no side effects

e.g., Query database, read file, fetch API

T1

Reversible

Actions that can be undone without data loss

e.g., Create draft, update config, stage changes

T2

Consequential

Actions with significant but bounded impact

e.g., Deploy to staging, modify records, send notifications

T3

Critical

High-impact actions requiring elevated review

e.g., Production deploy, data deletion, access grants

Technical FAQ

Judgment rendering typically completes in under 50ms (P95). For most agent workflows, this is negligible compared to the actions themselves.

Yes. Policies can incorporate context from external systems—user roles, system state, time of day, risk scores from other tools. This enables sophisticated, context-aware governance.

Policies are evaluated in precedence order. More specific policies override more general ones. Conflicts are logged and can trigger alerts for policy review.

The SDK can be configured to enforce judgments at the action layer. Additionally, outcome reporting detects mismatches between judgments and actual behavior, flagging compliance issues.

See ΔOS in action

Evaluate governance in a read-only environment with simulated data. No execution. No credit card.