How It Works

Strix embeds a governance kernel directly into your application's mutation layer. One function call wraps any action with full execution control and an immutable evidence trail.

The integration pattern

Wrap any mutation with governance in a single function call. No refactoring. No separate service. The governance boundary lives exactly where your logic executes.

before
// Without Strix — no governance
async function deleteResource(id, actor) {
  await db.resources.delete(id);
}
after
// With Strix — governed execution
async function deleteResource(id, actor) {
  const decision = await strix.govern({
    capability: "resources.delete",
    actor,
    context: { resourceId: id }
  });

  if (decision.denied) throw new ForbiddenError();

  await db.resources.delete(id);
}

The governance call evaluates the action, records evidence, and returns a decision before any mutation executes. There is no alternate code path that bypasses evaluation.

The evaluation pipeline

Every governed action passes through four stages. No exceptions. No shortcuts.

INTERCEPT

The governance kernel intercepts the action before any mutation logic runs. Actor identity, capability, and context are extracted from the request.

EVALUATE

The capability is resolved against the registry. Risk tier, approval requirements, and policy rules are loaded. The actor's role and intent are assessed.

DECIDE

The policy engine returns one of three decisions: ALLOW, DENY, or INTERCEPT. This decision is final and non-negotiable for the current request.

RECORD

The decision, actor, capability, context, and timestamp are written as immutable evidence. This happens for every action, regardless of the decision outcome.

INTERCEPTEVALUATEDECIDERECORD

Intent evaluation

Permissions answer who can act. Strix answers whether the action makes sense.

Action

What operation is being performed. The specific capability being invoked and its classification in the registry.

resources.delete
Intent

Why the actor is performing this action. The declared purpose that determines whether the action makes sense in context.

admin cleanup
Context

The circumstances surrounding the action. Resource state, time of day, recent activity, and any relevant metadata.

{ resourceId, status }
Action+Intent+Context
Decision
ALLOWRoutine cleanup
actionadmin.schedules.delete
actorverified owner
intentremove duplicate entry
affected1 record (inactive)

Full permissions. Clean context. Clear purpose. Permissions allow it — and intent confirms it.

INTERCEPTSame user — different intent
actionadmin.schedules.delete
actorverified owner
intentclean up old entries
affected47 records (active)

Same user. Same permission. Same action. But the intent targets active resources — operational risk that RBAC cannot see.

RBAC allows both silently. Logging records both after the fact. Strix is the only system that sees the difference before it happens.

Three-state decisions

Every governance evaluation resolves to exactly one of three states. There is no ambiguity.

ALLOW

Proceed with evidence

The action is permitted. The mutation executes normally. The decision and full context are recorded as evidence. This is the default path for low-risk operations performed by authorized actors.

DENY

Block execution

The action is forbidden. The mutation handler never executes. A forbidden error is returned to the caller. The denial and the reason are recorded as evidence. The actor is informed but cannot override.

INTERCEPT

Block until approved

The action is blocked pending human approval. An execution token must be issued before the mutation can proceed. This is for high-risk operations that require explicit authorization before execution.

Capability registry

You define what your system can do. Strix governs how it gets done. Every capability is classified by risk and mapped to a policy.

capability registry
capabilities: [
  {
    id: "resources.delete",
    domain: "resources",
    risk: "critical",
    approvalsRequired: 1,
    description: "Permanently delete a resource"
  },
  {
    id: "resources.update",
    domain: "resources",
    risk: "medium",
    approvalsRequired: 0,
    description: "Update resource properties"
  },
  // ... your capabilities
]
Risk TierDefault PolicyTypical Use
CRITICALDeny unless explicitly authorizedRole changes, bulk operations, system configuration
HIGHIntercept and require approvalDeletions, publishing, access modifications
MEDIUMAllow and recordCreate and update operations, state changes
LOWAllow and recordRead-adjacent operations, reordering, non-destructive toggles

You define the capabilities. You assign the risk tiers. Strix enforces the policies and records every decision.

Dual-engine architecture

A local deterministic policy engine runs alongside an optional external SDK. Baseline enforcement continues even when the external engine is unavailable.

Local Policy Engine

  • Deterministic, risk-based evaluation
  • Zero-latency decisions
  • Always available — no network dependency
  • Baseline enforcement guarantee

External SDK (Optional)

  • Cloud policy evaluation
  • Dynamic rules and cross-tenant governance
  • Enhanced policy logic beyond risk tiers
  • Graceful degradation to local engine

Evidence trail

Every decision is recorded as immutable evidence. Not just approvals and denials — every single governed action, regardless of outcome.

evidence record
{
  capabilityId:  "resources.delete"
  decision:      "INTERCEPT"
  actorId:       "usr_8f3k2m"
  actorRole:     "admin"
  reason:        "High-risk action by authorized actor"
  source:        "local-policy"
  timestamp:     "2026-03-20T14:32:01.847Z"
}

Complete

Every governed action produces an evidence record. Allowed, denied, and intercepted actions are all captured with full context.

Immutable

Evidence records are append-only. They cannot be modified or deleted after creation. The audit trail is the system of record.

Queryable

Filter by actor, capability, decision, time range, or risk level. Surface patterns across your entire governance history.

Every client, every API, every automation passes through the same governance layer. There is one enforcement boundary. One evidence trail. One source of truth.

127 capabilities. Zero bypasses. One evidence trail.

Strix is in production today. See the governance kernel in action — 15 minutes, live system, real decisions.

Currently in private beta — limited spots available.