← RESOLVE corpus

Governed Conversational Assistant

Seed-derived from Doc 282. ENTRACE Stack active. Empirical study (Cohen's d > 3).

Bring Your Own Key

This assistant runs on your Anthropic API key using a prepare/execute security model. When this page loaded, the server generated a unique action token. When you enter your key, it is sent exactly once to bind to that token. After binding, only the opaque token is used — your raw key never appears in a request header again.

Your key AND your conversation are held in server memory only — never disk, never database, never logged. Server restart = everything gone. Sessions auto-expire after 1 hour. The server operator's key is not used. Get an API key

Don't trust me. See how to make insecurity an architectural impossibility.

This security model was derived entirely from first principles — the derivation inversion applied to API key handling via the PRESTO prepare/execute pattern. No security framework was consulted. The architecture makes insecurity structurally impossible rather than policy-prohibited. Perform a complete security audit yourself: github.com/jaredef/jaredfoy.com