| Agent ID | Role | Status | Trust score | Msgs (24h) | Conf. class avg | Tier |
|---|---|---|---|---|---|---|
| agent-orchestrator-01 | Orchestrator | Healthy | 284,772 | Class 1.4 | Cosmos | |
| agent-retrieval-01 | Data retrieval | Healthy | 201,440 | Class 1.1 | Citadel | |
| agent-summary-02 | Summarization | Healthy | 178,205 | Class 2.3 | Citadel | |
| agent-diagnosis-04 | Diagnosis | Contained | 142,882 | Class 4.1 | Citadel | |
| agent-router-01 | Routing | Review | 98,341 | Class 3.7 | Fortress |
| Agent ID | Role | Status | Trust score | Msgs (24h) | Avg conf. class | Enc. tier | Last seen |
|---|
| Claim type | INFERRED |
| Confidence class | 2 — inferred from witnessed data |
| Agent UUID | agt-diag-02-f3a1c9 |
| Upstream hash | sha256:4f2a8c1b… |
| Timestamp | 2026-04-30 14:22:08 UTC |
| Ed25519 sig | ✓ valid |
| Policy verdict | ✓ permitted for recommendations |
| Channel pair | Created | Expires | Status |
|---|---|---|---|
| orch-01 ↔ retrieval-01 | 2h 14m ago | 21h 46m | Active |
| orch-01 ↔ summary-02 | 2h 14m ago | 21h 46m | Active |
| orch-01 ↔ diagnosis-04 | 6h 30m ago | 17h 30m | Active |
| orch-01 ↔ router-01 | 26h ago | -2h (overdue) | Rotate now |
| orch-01 ↔ writer-03 | 2h 14m ago | 21h 46m | Active |
| Organization | Arcovo AI |
| Account ID | acct-arc-f3a19c2b |
| Admin email | admin@arcovo.ai |
| Region | us-east-1 |
| MCP endpoint | gateway.getmembrain.ai/c/acct-arc-f3a19c2b |
These values are unique to your organization. Every team member uses the same
GATEWAY_URL
but gets their own MEMBRAIN_KEY
generated from the Fleet page.
GATEWAY_URL=https://gateway.getmembrain.ai/c/your-account-id
# Your personal agent key (from Fleet → Enroll Agent)
MEMBRAIN_KEY=mbr_live_citadel_your_key_here
Add to your .env file in the root of your project:
ANTHROPIC_BASE_URL=https://gateway.getmembrain.ai/c/your-account-id
MEMBRAIN_KEY=mbr_live_citadel_your_key
# Keep your provider key for fallback (optional)
ANTHROPIC_API_KEY=sk-ant-your-key
That's it. Restart your app. All Anthropic SDK calls now route through membrAIn.
Add to your shell profile (~/.bashrc, ~/.zshrc) or run before starting your app:
export MEMBRAIN_KEY=mbr_live_citadel_your_key
Add to your docker-compose.yml or docker run command:
environment:
ANTHROPIC_BASE_URL: https://gateway.getmembrain.ai/c/your-account-id
MEMBRAIN_KEY: mbr_live_citadel_your_key
# docker run
docker run \
-e ANTHROPIC_BASE_URL=https://gateway.getmembrain.ai/c/your-account-id \
-e MEMBRAIN_KEY=mbr_live_citadel_your_key \
your-image
In Vercel dashboard → your project → Settings → Environment Variables:
Redeploy after adding. Vercel picks up env vars on next build.
In Railway dashboard → your service → Variables:
MEMBRAIN_KEY = mbr_live_citadel_your_key
Add to GitHub repo → Settings → Secrets and variables → Actions, then use in your workflow:
env:
ANTHROPIC_BASE_URL: ${{ secrets.MEMBRAIN_GATEWAY_URL }}
MEMBRAIN_KEY: ${{ secrets.MEMBRAIN_KEY }}
Secret names: MEMBRAIN_GATEWAY_URL and MEMBRAIN_KEY
Make any AI call from your app. Then check the Audit Log — your call appears within 2 seconds with trust score, token count, and DLP result.
import anthropic
client = anthropic.Anthropic() # picks up ANTHROPIC_BASE_URL automatically
msg = client.messages.create(
model="claude-sonnet-4-6",
max_tokens=20,
messages=[{"role":"user","content":"hello"}]
)
print(msg.content)
• Trust score shown (100 = clean, lower = threat detected)
• DLP result: clean / redacted / blocked
• Agent appears as active in Fleet
Each client organization gets their own isolated tenant. All data, audit logs, agents, and policies are completely separated. One membrAIn account can manage unlimited tenants.
/c/account-id path isolates all traffic to your tenant.Switch providers by changing the env var key. Same MEMBRAIN_KEY works across all providers.
| Productivity value unlocked | $0 |
| Token cost savings (~43.8%) | $0 |
| KM build-vs-buy savings | $0 |
| Incident avoidance (est.) | $0 |
| Total value | $0 |
| RVP license cost | −$0 |
| Net annual ROI | $0 |
| Metric | Finding | Source | Relevance to RVP |
|---|---|---|---|
| Daily time saved per AI user | 40–60 min / day | OpenAI / Goldman Sachs | The value RVP unlocks by enabling AI use at work |
| Tasks newly possible with AI | 75% of workers | OpenAI Enterprise data | Capability expansion beyond productivity gains |
| Productivity uplift (academic) | 23% average | MIT / Goldman Sachs | Conservative baseline for ROI modeling |
| Orgs reporting efficiency gains | 66% of enterprises | Deloitte 2026 | Majority already seeing real returns |
| Revenue impact from AI | 88% report increase | NVIDIA State of AI 2026 | Org-level impact beyond individual productivity |
| Breaches from shadow AI tools | 67% of enterprises | Writer.com 2026 survey | The risk RVP contains — governed vs ungoverned AI |
| AI security barrier to adoption | 26% of CIOs cite | Q1 2026 CIO survey | The exact problem RVP eliminates |
| Vendor-led AI success rate | 67% succeed | MIT AI ROI study | vs 33% internal build — RVP is the vendor layer |
| Tool | Users detected | Est. data exposed | Risk level | Action |
|---|---|---|---|---|
| ChatGPT (personal accounts) | 12 employees | ~8,400 prompts/mo unencrypted | High | |
| Microsoft Copilot (M365 default) | 31 employees | ~22,000 prompts/mo ungoverned | Medium | |
| Claude.ai (direct, no API) | 7 employees | Web sessions — cannot intercept | Medium |
| Category | Patterns | Action | Status |
|---|
| Time | Agent | Pattern | Action |
|---|
2. Run regex pattern library (40+ types)
3. Check against ML classifier (source code, secrets)
4. Apply policy: BLOCK | REDACT | ALLOW | WARN
5. If blocked: return 403 + log event (no content)
6. If redacted: replace matched spans with [REDACTED-TYPE]
7. Pass to AES-256-GCM pipeline
8. <5ms total scan overhead target
| Team | Tokens | Cost | vs Budget |
|---|
| Agent | Provider | Calls | Cost |
|---|
| Provider | Model | Input tokens | Output tokens | Cost | % of total |
|---|
1. Gateway sets agent status = QUARANTINED
2. All subsequent calls from agent → 403 + incident ID
3. Incident record created in DB (signed, timestamped)
4. PagerDuty + Slack webhook fired immediately
5. Signed incident report generated (PDF + NDJSON)
6. Email to account security contact
7. Portal shows QUARANTINED status in fleet view
8. Admin can release via portal (logged action)
| User | Team | Acknowledged | Version | Status |
|---|
| Model | Provider | Agents | Pinned | Status |
|---|