Secure agent tool calls now.
Start with the Apache-2.0 kernel, CLI/API, proxy, receipts, demo, and GitHub repo. View GitHub.
HELM
HELM sits between agents and the tools they want to use. It checks actions before execution, returns allow, deny, or escalate verdicts, and records a receipt for the decision. It is not an agent framework, copilot, or generic orchestration dashboard.
Start inside HELM
Mindburn Labs stays the company wrapper. HELM owns the product-local paths for developers, operating teams, enterprise evaluators, and standards readers.
Start with the Apache-2.0 kernel, CLI/API, proxy, receipts, demo, and GitHub repo. View GitHub.
Use HELM as the boundary for approvals, policies, evidence handling, and operator workflow around the same kernel. Request design partner access.
Review PEP/CPI, ProofGraph, EvidencePacks, fail-closed connectors, deployment isolation, and evidence retention. Request architecture review.
Use research, public artifacts, and HELM proof surfaces to separate current implementation from long-horizon thesis. Read research.
Mechanism
The model proposes an action. HELM evaluates authority at the boundary. Allowed actions can proceed. Denied actions stop. Ambiguous actions wait for human approval. Every verdict creates evidence.
Use cases
The common pattern is not a chat interface. It is a proposed side effect that must be checked before it touches the world.
Evaluate tool intent before a connector runs.
Require policy and approval before changes reach infrastructure.
Keep reads and exports inside scoped authority.
Allow small actions, escalate larger ones, deny out-of-scope requests.
Hold outbound messages when review is required.
Block side effects when the boundary cannot verify the action.
Architecture
HELM exposes a plain boundary: action, policy, verdict, receipt. The technical model underneath uses a policy enforcement point, deterministic validation, ProofGraph records, EvidencePacks, signed receipts, and fail-closed connector behavior.
The side-effect boundary where authority is checked before dispatch.
The deterministic validator for policy and proof constraints.
The causal record of intents, verdicts, receipts, and effects.
A signed evidence bundle that lets a decision be checked outside the live system.
Product-local surfaces
The OSS kernel is public. Team workflow and enterprise evaluation language must stay additive and source-backed.
Apache-2.0 execution kernel, CLI/API, proxy, evidence export, verifier path, and public SDK surfaces.
Organizational workflow around the kernel: policies, approvals, evidence services, retention, and operator surfaces. Treat this as the Teams bridge unless stronger SKU docs say more.
Institutional deployment patterns belong here only when source evidence supports the public wording: architecture, isolation, auditability, evidence, and retention.
HELM does not try to be the agent. It governs whether proposed execution is allowed.
HELM proof
HELM should never ask for trust first. This section points to the repo, versioned artifact, protocol notes, demo receipt, and verifier path.
Public Apache-2.0 OSS kernel repository for HELM's execution boundary.
Current public HELM OSS line used by this site for versioned proof references.
Public protocol note for receipt shape, hash binding, signer metadata, and replay requirements.
Scripted support-agent scenario with real receipt tamper verification against static signed fixtures.
Public verifier note for checking HELM evidence outside the runtime that produced it.
Start with the OSS kernel, run the demo, or contact Mindburn Labs about an execution boundary.