IRL Engine v1.2 · Production

Cryptographic
chain of custody
for autonomous trading.

IRL seals every AI decision before it reaches the exchange — cryptographically, before execution. Pre-execution policy enforcement. Bitemporal audit ledger. The compliance standard regulators will require, adopted by serious funds first.

pip install irl-sdk · npm install irl-sdk Python 3.10+ · Node ≥18
Agent-42 · reasoning snapshot
actionLong BTC-USD
quantity0.5
notional32,500
POST /irl/authorize
IRL Engine · pre-execution gate
MAR registry verified
Policy checks passed
Bitemporal gate clear
SHA-256 sealing...

reasoning_hash → a3f2d9c1e8b047f5...
embed hash → place order
Exchange
exchange_tx_idex9a2f...
POST /irl/bind-execution
Final proof · chain closed
✓ MATCHED
final_proof = SHA-256(reasoning_hash ‖ tx_id)
<3ms
Seal latency
Ed25519
Signed broadcasts
SHA-256
Canonical seal
99.9%
L2 uptime SLA
5 regs
Mapped directly

The Ownership Gap

Current observability infrastructure captures what autonomous agents did and when. It cannot prove why — or what the agent knew at the moment of decision. This is the gap that regulators are asking about, and that no existing tool closes.

Capability Current state With IRL
What action was takenLoggedLogged + sealed
When the action occurredSingle timestampBitemporal (valid_time + txn_time)
Why the action was takenApproximate / inferredDeterministic CognitiveSnapshot
What the agent knew at decision timeNot provableCryptographically proven via L_t fingerprint
Whether constraints were enforcedNot guaranteedPre-execution hard halt on violation
Which model produced the decisionNot verifiableModel hash in Multi-Agent Registry
Whether execution matched reasoningNot trackedPost-trade verifier with divergence detection

The Audit Chain

Every trade produces a cryptographic chain from regime attestation to exchange confirmation. No party can alter any link without breaking the chain.

MacroPulse MTA
Ed25519-signed regime broadcast. Cryptographic proof of the macro state at the exact moment of decision.
IRL Engine — POST /irl/authorize
Agent submits reasoning snapshot. IRL runs all pre-execution checks atomically.
MAR check Policy enforce L_t fingerprint Bitemporal gate SHA-256 seal
Agent receives
reasoning_hash + trace_id — embedded in exchange order metadata before submission.
Exchange execution
Order hits the market. Execution report returned to agent with exchange_tx_id.
IRL Engine — POST /irl/bind-execution
final_proof = SHA-256(reasoning_hash ‖ exchange_tx_id) — chain closed.
MATCHEDChain closed. Regulator can verify independently.
DIVERGENTFlagged. Reason recorded permanently.

Try it now — no setup

Three demo agents are pre-seeded. Use Swagger UI to run a full authorize → bind-execution cycle in-browser. No API key, no registration.

Wire any agent in under 20 lines

Native SDKs for Python and TypeScript wrap the IRL REST API with typed models and automatic heartbeat handling. Available on PyPI and npm — no build step required.

PYTHON · pip install irl-sdk
import asyncio
from irl_sdk import IRLClient, AuthorizeRequest

async def trade():
    async with IRLClient("https://irl.macropulse.live") as client:
        result = await client.authorize(AuthorizeRequest(
            agent_id="agent-42",
            model_hash_hex="a3f2...",
            action="Long",
            asset="BTC-USD",
            quantity=0.5,
            notional=32500,
        ))
        if result.authorized:
            place_order(reasoning_hash=result.reasoning_hash)

asyncio.run(trade())
irl-sdk on PyPI →
TYPESCRIPT · npm install irl-sdk
import { IRLClient } from "irl-sdk";

const client = new IRLClient({
  irlUrl: "https://irl.macropulse.live",
  apiToken: process.env.IRL_API_TOKEN!,
});

const result = await client.authorize({
  agent_id: "agent-42",
  model_hash_hex: "a3f2...",
  action: "Long",
  asset: "BTC-USD",
  quantity: 0.5, notional: 32500,
});
if (result.authorized)
  placeOrder(result.reasoning_hash);
irl-sdk on npm →
Developer Guide Live Sandbox Python 3.10+  ·  Node.js ≥ 18  ·  CJS + ESM

Three Editions

Each layer is independently deployable. Start with L1 in under a day. Upgrade when your regulatory requirements escalate.

L2 IRL Audit Platform Live
Enterprise compliance with anti-replay and signed market truth.
  • Everything in L1, plus:
  • Signed heartbeats — monotonic sequence + Ed25519, binds each request to a specific MTA broadcast
  • Replay prevention — an agent cannot use a historical regime to authorise a present-day action
  • Forensic replay API — any historical trade reconstructable from its sealed snapshot
L3 IRL Sovereign Gateway
For clients where compliance cannot reveal alpha.
  • Everything in L2, plus:
  • TEE execution — policy enforced inside a hardware-attested enclave (Intel TDX / AMD SEV)
  • Wasm policy modules — hot-reloadable sandboxed policies, no engine changes required
  • ZK compliance proofs — prove policy adherence to a regulator without revealing model or strategy
  • Double-Green signing — exchange API key inaccessible unless both MTA and MAR checks pass

Bring Your Own Signal — or Use Ours

IRL's engine is agnostic to the regime source. The MtaClient interface accepts any cryptographically signed signal — MacroPulse's pipeline, your own quant model, or nothing at all. Three modes. Same audit guarantees.

Agent
reasoning snapshot
MTA Signal
signed regime state
IRL Engine
pre-execution seal
Exchange
order placed
02 — Bring Your Own
Custom MtaClient
Implement a single Rust trait and pass it at startup. Your model stays private; your compliance chain is cryptographically identical to Mode 01.
  • One trait: MtaClient — 3 methods
  • Any signal format: REST, gRPC, or shared memory
  • IRL seals against your signal, not ours
  • For quant firms with proprietary regime models
MTA_MODE=custom
MTA_IMPL=./mta_client.so
MTA_PUBKEY=ed25519:...
03 — Policy Only
MtaMode::None
Bypass regime verification entirely. All Multi-Agent Registry policy checks — notional caps, side constraints, per-agent rules — remain fully active.
  • No external signal dependency
  • MAR policies enforced as normal
  • Seal records signal_mode="none"
  • For firms managing macro risk internally
MTA_MODE=none
# KMS encryption still active
# Audit chain unaffected
v1.2
KmsProvider — snapshots encrypted at rest

Each reasoning snapshot receives a per-trace DEK before ledger write. KMS_PROVIDER=local for single-node; AWS KMS, GCP KMS, or hardware HSM via the KmsProvider trait. Hash chain integrity is independent of storage encryption — audit proofs hold regardless.

Built for the Regulations That Are Coming

IRL produces evidence that maps directly to specific regulatory requirements — not general "auditability," but the specific proof each framework asks for.

Requirement IRL mechanism
EU AI Act Art. 12 Requires high-risk AI systems to automatically log events enabling post-market monitoring and incident investigation. Autonomous trading systems are classified as high-risk under Annex III. Phased enforcement begins 2025–2027. Read regulation → — Decision auditability reasoning_hash = SHA-256(canonical snapshot)
EU AI Act Art. 13 Mandates that high-risk AI systems be sufficiently transparent that deployers can understand and interpret outputs. Requires logging of decisions and human oversight capability — including disclosure to regulators on request. Read regulation → — Transparency to regulators ZK proof: compliance verified without alpha disclosure
SEC Rule 15c3-5 The Market Access Rule requires broker-dealers with market access to implement pre-trade risk controls and supervisory procedures. Firms must have systems to prevent erroneous orders and ensure compliance with applicable regulatory requirements. Read regulation → — Pre-trade risk controls Policy Engine blocks non-compliant intents before execution
MiFID II RTS 6 Requires algorithmic traders to maintain contemporaneous records of all algorithmic orders showing time of creation, modification, cancellation and execution. Records must include the parameters that triggered the order and remain available to regulators for five years. Read regulation → — Contemporaneous recordkeeping Bitemporal timestamps: valid_time + txn_time, immutable
DORA Art. 9 & 10 The Digital Operational Resilience Act requires financial entities to maintain registers of all ICT-supported functions and third-party dependencies, with continuous monitoring and incident classification. Applies to AI systems used in financial decision-making from Jan 2025. Read regulation → — Fleet governance Multi-Agent Registry: per-agent identity and risk controls

Per-Agent.
Not Per-Trade.

The value of a sealed reasoning trace is in its existence — not in counting seals. Flat per-agent pricing means compliance scales linearly with your fleet, never with your volume. L1 is operational in under a day.

L2
IRL Audit Platform
Enterprise compliance. Anti-replay. Signed market truth.
$1,200 / agent / mo
MIN 3 AGENTS · 99.9% SLA

  • Everything in L1, plus:
  • +Signed heartbeats — monotonic Ed25519 sequence, anti-replay enforced
  • +MacroPulse MTA integration — or plug in your own MtaClient
  • +Forensic replay API — any historical trade reconstructable from its sealed snapshot
  • +Merkle anchoring — period root hashes anchored to Bitcoin via OpenTimestamps
  • +Compliance dashboard — read-only regulator view
Agents: 3 $3,600/mo
Coming Soon
L3
IRL Sovereign Gateway
For clients where compliance cannot reveal alpha.
Enterprise
TEE + ZK · QUOTED PER ENGAGEMENT

  • Everything in L2, plus:
  • +TEE execution — Intel TDX / AMD SEV hardware-attested enclave
  • +Wasm policy modules — hot-reloadable, sandboxed, zero engine restarts
  • +ZK compliance proofs — prove adherence without revealing model or strategy
  • +Double-Green signing — API key inaccessible until MTA + MAR both pass
  • +Dedicated support · Quarterly review
Notify me →

Fleet discounts — L1 & L2

Fleet sizeDiscount
1–5 agentsList price
6–15 agents−15%
16–30 agents−25%
31+ agents−35% (negotiated)

Add-ons

MacroPulse MTA (L1 add-on)+$300/mo
Custom MTA deploymentsno surcharge

Start With the Sandbox

The API is live. Three demo agents are pre-seeded. Try authorize + bind-execution in Swagger UI before committing to a deployment conversation.

Open Swagger UI → Contact for Licensing