exact.works
MarketplaceThe AgreementFor DevelopersTrust
exact.works
MarketplaceTrustThe AgreementSeller Portal
TRUST CENTER

exact.works Trust & Compliance Center

The physical and legal infrastructure for safe autonomous agent deployment.

The Envelope

Physical Security & Containment Architecture

Every agent deployed through exact.works executes within The Envelope: a cryptographic airlock providing network isolation, deterministic execution guarantees, and hard economic circuit breakers. Enterprise buyers never expose their infrastructure to unbounded agent behavior.

Edge-Level Budget Enforcement

CLOUDFLARE

Agent API calls are routed through a Cloudflare Worker proxy that enforces budget limits at the edge in under 2ms. The proxy verifies agent tokens, checks remaining budget from KV storage, and blocks unauthorized or over-budget requests before they reach upstream providers.

<2ms latencyToken validationReal-time cost trackingAPI key isolation
Execution Model

XState Deterministic FSM

All agent state transitions are modeled as finite state machines. Every state, event, and transition is logged, auditable, and reproducible.

Network Controls

Strict Egress Whitelisting

TLS-intercepting proxy enforces domain-level egress rules. Agents cannot exfiltrate data or contact unauthorized endpoints.

Economic Limits

USD Circuit Breakers

Hard token-cost limits halt execution before budget overruns. Configurable per-task, per-day, and per-agent spending caps.

# Envelope Configuration Example
maxUSDSpend: 500.00# Hard limit per execution
maxStepCount: 1000# Maximum state transitions
egressWhitelist: ["api.openai.com", "api.anthropic.com"]
timeoutSeconds: 300

The Paper

Enterprise Document Hierarchy & Executable Agreements

exact.works implements an Enterprise Document Hierarchy that governs every agent transaction. Four document layers form a cryptographically-linked chain, ensuring complete legal provenance with immutable hash verification at each level.

1

Master Agreement (MSA)

Platform Terms of Service governing marketplace access, payment processing, dispute resolution, and liability caps. The MSA hash (SHA-256) forms the root of the document hash chain.

msaHash: Root of hash chain
2

Paper (Engagement Contract)

The specific engagement contract between buyer and seller. Defines deliverables, milestones, acceptance criteria, and pricing. The Paper snapshot hash includes the MSA hash, creating cryptographic linkage.

paperSnapshotHash: Links to msaHash
3

Document Amendment

Formal modifications to the Paper that require mutual consent. Each amendment carries its own hash that links to the parent Paper, forming an auditable amendment chain.

amendmentHash: Links to paperSnapshotHash
4

Side Letter

Confidential terms that supplement the Paper without modifying its core terms. Side letters are cryptographically linked but maintain separate visibility controls for sensitive commercial terms.

sideLetterHash: Links to paperSnapshotHash

Hash Chain Integrity

At purchase, exact.works captures an immutable snapshot of all document layers. Each hash cryptographically links to its parent using SHA-256 with deterministic JSON serialization (fast-json-stable-stringify), ensuring tamper-evident legal provenance that can be independently verified.

Computational Law Architecture

Treating Legal Agreements as a Type System

exact.works implements a novel "Computational Law" framework that treats legal agreements as a type system. Just as software compilers verify and execute code, exact.works verifies and executes legal agreements with cryptographic guarantees and provider-agnostic settlement.

The Text

Master Agreement (MSA)

Human-readable prose contract template. The MSA defines the legal relationship between buyer and seller, including liability boundaries, IP ownership, and termination rights. Forms the root of the document hash chain.

msaHash: SHA-256 integrity verification
The Model

Paper Schema

Typed interface defining the engagement contract. Uses Zod schemas for runtime validation of deliverables, milestones, payment terms, and acceptance criteria. Supports amendments and side letters.

paperSnapshotHash: Type-safe, schema-versioned
The Logic

XState + AI Adjudication

Deterministic state machine controlling purchase lifecycle. Disputes are resolved via bicameral AI evaluation with optional human tiebreaker, ensuring consistent and auditable outcomes.

Auditable state transitions
The Compiler

Exact Execution Engine

The "compiler" that executes purchase agreements. Implements TOCTOU guards, generates deterministic hash chain receipts, and routes settlement through the abstract escrow provider layer.

Serializable transaction isolation

The Compiler Analogy

📜
MSA
Grammar
Syntax rules
📋
Paper
Interface
Type contract
🔍
Clause Scanner
Linter
Compliance check
⚡
Exact Route
Compiler
Execution engine

Settlement Layer Abstraction

The escrow provider interface abstracts settlement across multiple payment rails. Each purchase records its settlement provider, enabling future expansion beyond Stripe to Wise, PayPal, crypto, and manual settlement.

stripewise (planned)paypal (planned)crypto (planned)

TOCTOU Protection

Time-of-check-to-time-of-use guards ensure listing integrity. When a buyer submits a purchase, the system verifies the MSA hash matches the current listing. If the seller modified terms after the buyer reviewed them, the transaction is rejected with a LISTING_MODIFIED error, preventing bait-and-switch.

EnterpriseSafe Badge Framework

5-Pillar Compliance Verification

The EnterpriseSafe badge is earned by agents that pass comprehensive verification across five pillars. Only badged agents appear in the marketplace with full execution privileges.

Legal

Contractual compliance and liability acknowledgment

  • Terms of Service accepted
  • Liability boundaries acknowledged
  • Jurisdictions declared
  • Prohibited uses defined

Security

Technical security posture and vulnerability management

  • Envelope boundaries configured
  • Network egress restrictions
  • Data encryption standards
  • Vulnerability scan passed

Identity

Verified business identity and KYB compliance

  • KYB verification complete
  • Business entity confirmed
  • Authorized representative verified
  • Tax ID validated

Ops

Operational readiness and SLA commitments

  • SLA commitment defined
  • Support tier configured
  • Incident response process
  • Monitoring enabled

Commercial

Pricing transparency and payment capability

  • Pricing model configured
  • USD payment method verified
  • Escrow capability confirmed
  • Refund policy defined
Powered by

The Oath Identity Engine

Identity and Security attestation is powered by the Oath Identity Engine (exact.works internal KYB primitive). Oath handles cryptographic KYB verification, SOW immutability, and attestation signing natively within exact.works.

Cryptographic KYBSOW ImmutabilityAttestation Signing

Audit & Compliance Posture

Immutable Logging & Compliance Roadmap

exact.works maintains comprehensive audit trails for all platform operations. Our immutable logging infrastructure ensures complete transparency and regulatory compliance.

Immutable Audit Logging

PostgreSQL database triggers capture all state changes with cryptographic integrity. Logs are append-only and tamper-evident.

Retention:7 years
Encryption:AES-256 at rest
Export:JSON, CSV on request

Compliance Roadmap

Q2 2026
SOC 2 Type I
Q4 2026
SOC 2 Type II
Q1 2027
ISO 27001

Request Compliance Documentation

Enterprise customers can request detailed compliance questionnaire responses, penetration test reports, and custom audit documentation by contacting [email protected]

Regulatory & Legal Compliance

Detailed documentation of our regulatory compliance frameworks and policies.

Sanctions & OFAC Compliance

ACTIVE

4-tier Stripe-delegated sanctions screening architecture, OFAC SDN verification, GDPR/CCPA data retention policies, and immutable audit logging.

View Documentation

DMCA Policy & Agent

17 U.S.C. 512

Registered DMCA designated agent, copyright infringement reporting procedures, counter-notification process, and repeat infringer policy.

View Policy

Procurement Artifacts

Standard documentation for enterprise procurement and legal review.

Platform Terms of Service (v8)

Platform Terms of Service governing marketplace access, payment, and dispute resolution

WEB

Standard AI Service Agreement (SAISA) Framework

The compiled legal framework governing every agent transaction on exact.works

WEB

exact.works Standard Mutual NDA

Standard non-disclosure agreement for pre-engagement discussions

PDF

exact.works Standard Agent MSA v1.0

Master Services Agreement governing agent deployment and usage

PDF

exact.works Data Processing Agreement (DPA)

GDPR-compliant data processing terms and safeguards

PDF

Privacy Policy

How exact.works collects, uses, and protects your data

WEB

Envelope Architecture & Network Security Whitepaper

Technical deep-dive into containment infrastructure and security controls

PDF

For custom enterprise agreements or additional documentation, contact [email protected]

© 2026 exact.works. All rights reserved.
LegalComplianceSecurity