by cordum-io
The open agent control plane. Govern autonomous AI agents with pre-execution policy enforcement, approval gates, and audit trails. Works with LangChain, CrewAI, MCP, and any framework.
# Add to your Claude Code skills
git clone https://github.com/cordum-io/cordumEnterprises are rushing to deploy Autonomous AI Agents, but they're hitting a wall of risk. According to Gartner, 74% of enterprises see AI agents as a new attack vector, and over 40% of agentic AI projects will be canceled due to inadequate risk controls.
The current landscape leaves teams with a choice:
Without a dedicated governance layer, you're flying blind:
Cordum is an Agent Control Plane that provides a deterministic governance layer for probabilistic AI minds. It allows you to define, enforce, and audit the behavior of your Autonomous AI Agents across any framework or model.
graph TB
subgraph CP [AGENT CONTROL PLANE]
direction LR
G[API Gateway] --- S[Scheduler] --- SK[Safety Kernel]
S --- WE[Workflow Engine]
end
subgraph AGENTS [AUTONOMOUS AGENT POOLS]
direction LR
A1[Financial Ops]
A2[Data Science]
A3[Customer Service]
end
CP -->|Governed Jobs| AGENTS
AGENTS -->|Audit Trail| CP
Cordum's Before/During/Across framework provides exhaustive control over your agent operations:
graph LR
subgraph BEFORE [1. BEFORE - Governance]
P[Policy Evaluation] --> S[Safety Gating]
S --> H[Human Approval]
end
subgraph DURING [2. DURING - Safety]
M[Real-time Monitoring] --> C[Circuit Breakers]
C --> A[Live Approvals]
end
subgraph ACROSS [3. ACROSS - Observability]
F[Fleet Health] --> T[Audit Trail]
T --> O[Optimization]
end
BEFORE --> DURING
DURING --> ACROSS
Prerequisites: Docker (4GB+ RAM), Docker Compose, Go 1.24+
git clone https://github.com/cordum-io/cordum.git
cd cordum
./tools/scripts/quickstart.sh
That's it. The script auto-creates .env, generates API keys and Redis password, builds all services, and runs health checks. No manual configuration needed.
Dashboard: http://localhost:8082
Login: admin / admin123 (change in .env → CORDUM_ADMIN_PASSWORD)
cp .env.example .env
# Edit .env: set CORDUM_API_KEY (or generate: openssl rand -hex 32)
export CORDUM_API_KEY="your-key-here"
go run ./cmd/cordumctl up
open http://localhost:8082
| Port | Service | |------|---------| | 8082 | Dashboard | | 8081 | API Gateway (HTTPS) | | 9080 | gRPC Gateway | | 4222 | NATS | | 6379 | Redis | | 9092 | Gateway Metrics | | 9093 | Workflow Engine Health | | 50051 | Safety Kernel (gRPC) | | 50400 | Context Engine (gRPC) |
# Submit a test job
curl -sS --cacert ./certs/ca/ca.crt \
-X POST https://localhost:8081/api/v1/jobs \
-H "X-API-Key: $CORDUM_API_KEY" -H "X-Tenant-ID: default" \
-H "Content-Type: application/json" \
-d '{"topic":"job.default","context":{"prompt":"hello"}}'
# Stop the stack
docker compose down
# View logs
docker compose logs -f api-gateway
| Issue | Fix |
|-------|-----|
| Port already in use | docker compose down then retry, or check lsof -i :8082 |
| Docker out of memory | Allocate at least 4 GB RAM to Docker Desktop |
| Can't login to dashboard | Default credentials: admin / admin123 |
| TLS/SSL cert errors | Remove ./certs/ and re-run — certs auto-regenerate |
| openssl not found | Not needed — quickstart.sh auto-generates keys without it |
| Go build fails | Requires Go 1.24+ — check with go version |
| Stale config after changes | redis-cli DEL cfg:system:default then restart |
For detailed troubleshooting, see docs/troubleshooting.md.
| Governance Feature | Why It Matters for Enterprise | |--------------------|--------------------------------| | Safety Gating | Prevents agents from executing destructive or unauthorized actions before they occur. | | Output Quarantine | Automatically blocks PII leaks, secrets, or hallucinated results from reaching the client. | | Human-in-the-Loop | Mandates human oversight for high-risk operations (e.g., financial transfers, prod access). | | Pool Segmentation | Ensures sensitive data only reaches agents in trusted environments. | | Deterministic Audit | Prove exactly why a decision was made with a full chain-of-thought audit trail. | | Governance Policies | Declarative YAML-based rules that map enterprise risk to agent behavior. | | Policy Simulator | Test your governance rules against historical data before rolling them out to production. |
cordum/
├── cmd/ # Service entrypoints + CLI
│ ├── cordum-api-gateway/ # API gateway (HTTP/WS + gRPC)
│ ├── cordum-scheduler/ # Scheduler + safety gating
│ ├── cordum-safety-kernel/ # Policy evaluation
│ ├── cordum-workflow-engine/ # Workflow orchestration
│ ├── cordum-context-engine/ # Optional context/memory service
│ └── cordumctl/ # CLI
├── core/ # Core libraries
│ ├── controlplane/ # Gateway, scheduler, safety kernel
│ ├── context/ # Context engine implementation
│ ├── infra/ # Config, storage, bus, metrics
│ ├── protocol/ # API protos + CAP aliases
│ └── workflow/ # Workflow engine
├── dashboard/ # React UI
├── sdk/ # SDK + worker runtime
├── cordum-helm/ # Helm chart
├── deploy/k8s/ # Kubernetes manifests
└── docs/ # Documentation
| Doc | Description | |-----|-------------| | System Overview | Architecture and data flow | | Core Reference | Deep technical details | | Docker Guide | Running with Compose | | Agent Protocol | CAP bus + pointer semantics | | MCP Server | MCP stdio + HTTP/SSE integration | | Pack Format | How to package agent capabilities | | Local E2E | Full local walkthrough | | Production Guide | TLS, HA, backups, incident runbooks |
Cordum implements CAP (Cordum Agent Protocol), an open protocol specifically designed for distributed AI agent governance. CAP provides a unified interface for defining agent capabilities, submitting jobs, and
No comments yet. Be the first to share your thoughts!