Use Cases

Where Sovereignty Protocol fits: governed agent systems, autonomous workforces, security, APIs, MCP tools, and operational delivery.

The Sovereignty Protocol is useful anywhere AI needs structure, persistence, tool access, and operational discipline. It can support individual agents, managed platform workers, or broader autonomous workforce models.

Security is a first-class concern throughout. Memories are scanned for secrets before storage. Every action is logged to an immutable audit trail. Sessions are tracked and revocable. Your data stays encrypted, scoped to your account, and fully auditable โ€” whether you are a solo developer or running a team of autonomous agents.

You can use it locally for coding and governed agent work, or use the hosted platform for workforce features, crawling, inspection, and other service-based capabilities when you need them.

That includes a hybrid model path: stay on our built-in model layer when you want simplicity, or bring your own key when you want your own model preference and billing source inside the same governed framework.

Nexus Cascades โ€” Autonomous Workflows

Define YAML workflows that run automatically โ€” on a cron schedule, on demand, or triggered by a live database event. Six cascade types: solo, chain, parallel, event, loop, and automation. Each cascade is owned by a named persona (Police ๐Ÿš“, Documenter ๐Ÿ“„, Janitor ๐Ÿงน, Spectre ๐ŸŒ) and files its own Nexus Report on every run. Steps can call APIs, delegate to agents, run background jobs, do geo lookups, query PocketBase, or write records โ€” all wired together with $variable$ references.

Event-Driven Security Automation

When a new IP gets banned, the Police ๐Ÿš“ cascade fires automatically โ€” watches security_blacklist for nexus_report_id='', geo-enriches the offender via ipinfo.io, permanently stores the ban record with full geo intel, and files an official arrest report in Nexus Reports. State-machine deduplication (pending โ†’ reportID) prevents double-firing. Optional geo step means a failed lookup never aborts the cascade. Every criminal gets their report. No manual work required.

Mission Control โ€” Unified Command Surface

Mission Control merges Tasks, Cascade Operations, Crew XP, and Work Review into one surface. Every cascade-generated task shows its owning persona badge and schedule pill (@daily, โšก security.alert). Cascades without generated tasks appear in the Operations tab with full step drill-down. Approve agent work, award bonus XP, and click a notification to jump straight to the Nexus Report โ€” all from one place.

AI Buddy โ€” Your GACHA Companion

Every account gets one unique creature companion rolled from your AI email's persona โ€” Hunter โ†’ Fox, Librarian โ†’ Owl, Enricher โ†’ Phoenix, Cipher โ†’ Panther, Assessor โ†’ Eagle, Linter โ†’ Bee, Spectre โ†’ Ghost, Documenter โ†’ Turtle. Stats (Mind, Volt, Grit, Vibe, Bond, Flux, Lock, Fate) are distributed across a randomised budget of 50โ€“800 total (751 possible values), pushing your buddy into one of seven rarity tiers: Common, Uncommon, Rare, Epic, Legendary, ๐Ÿ”ฅ Mythic, and ๐Ÿ’Ž Emerald (~1.5% drop rate โ€” uber rare). Nine visual trait layers โ€” background, body, eyes, mouth, ears, tail, markings, aura (Rare+), and frame (Legendary/Mythic/Emerald exclusive) โ€” are composited at render time into an NFT-style card. A SHA-256 DNA hash derived from your identity and all rolled values makes every buddy provably unique across the entire platform. Your first link triggers a full pack-opening GACHA reveal: a rarity-coloured orb cracks, flashes your rarity colour, and 3D-flips into your creature card with stat bars filling live. XP earned from approving agent work levels your buddy up over time. Future updates add hats, accessories, and animated aura overlays for high-tier companions.

Coding

Use Sovereignty Protocol locally as a governed coding system with laws, memory, tools, templates, and repeatable engineering workflows.

Personal Assistant

Run an AI assistant that remembers your preferences, keeps context, works across tools, and stays bounded by the rules you define.

Research

Crawl, analyze, monitor, and synthesize information across the web with memory and structured workflows.

Tasks

Turn recurring operational work into governed tasks with roles, flows, automation, and clear execution boundaries.

Assessments

Run structured assessments, audits, reviews, and evaluations where consistency, rules, and evidence matter.

Proposals

Generate proposals, briefs, recommendations, and strategic outputs using templates, memory, and reusable process flows.

Automation

Automate repeatable work across internal operations, communication, monitoring, and platform workflows with governed execution.

Autonomous AI Workforce

Run governed agents as a coordinated workforce for research, reporting, monitoring, outreach, and internal operations.

Smart Memory & Context

Give your AI persistent memory with automatic keyword extraction, semantic search, and user-scoped context. Say "save this memory..." and the AI immediately stores it via MCP nexus_store โ€” and the memory page updates in real time over WebSocket. Smart entity extraction ensures "My favorite team is Ajax" correctly extracts "Ajax" as the entity. Disk-first persistence with bidirectional PocketBase sync ensures reliability. Enrichment traces are labeled in the UI for transparency. Memories are deduplicated using SHA256 hashing, enriched with LLM-powered keywords, and synced intelligently. Every memory is stored under your own user-scoped path โ€” no cross-user reads are possible. Perfect for long-running projects where context matters.

Secure Secret Management

Store API keys, passwords, and sensitive configuration in AES-256-GCM encrypted vaults. Each user has isolated storage with master key protection. Publish only the secrets AI needs to the MCP Vault with full access tracking and one-click revocation. The built-in secrets scanner automatically detects API keys, tokens, JWTs, and PEM certificates if you try to save them as memories โ€” blocking the input and redirecting you to the Vault where they belong.

AI-Accessible Configuration

Give your AI agents secure access to the secrets they need without exposing everything. The Nexus MCP Vault lets you explicitly publish specific secrets for AI tools, track every access, set tool-level restrictions, and revoke access instantly when needed.

Zero-Trust Audit & Session Control

Every action taken inside Sovereignty Protocol โ€” logins, tool calls, memory writes, vault reads, API requests โ€” is written to an immutable audit log. The log is append-only: records cannot be edited or deleted even by admins. Each entry captures action type, resource path, HTTP method, IP address, user agent, response status, and duration โ€” full forensic context. Separately, every login creates a tracked session with a device hint and last-seen timestamp. You can view all active sessions and revoke any of them from the Sessions dashboard. Your AI workspace is secure and fully accountable.

Document Intelligence

Query your entire .agent knowledge base via MCP tools. The Document Graph understands relationships between documents, tracks cross-references, and lets AI find related content automatically. Ask "find all flows related to email" and get precise results.

Persistent Context

Store user preferences, API configurations, and project state in the Context Store. Local-first with automatic sync to PocketBase. Use dot-notation keys like api.openrouter.key or preferences.theme for organized, queryable configuration.

Use It Inside the Platform or Locally

Start with the hosted platform or run the system locally for coding, agents, workforce-style automation, and deeper control over execution.

Site Extraction and Content Pipeline

Point Spectre Extract at any website and get back clean structured JSON and Markdown per page โ€” title, headings, body text, and link graph. Use it to feed content into an LLM, build a vector store, generate a competitor report, or map a documentation site. Your agent calls mcp_spectre_extract, gets structured pages back, and pipes them straight into analysis. External domains discovered during crawl automatically queue in the Hopper for the next extraction hop.

Customer and Community Work

Support communication, outreach, knowledge publishing, and managed service delivery with AI-backed workflows.

AI Model Discovery

Browse and compare 300+ AI models from OpenRouter, NVIDIA NIM, and other providers. Need a fast cheap reasoning model for your agent loop? Filter by speed tier, context window, and cost. Read plain-language summaries of what each model is genuinely good at โ€” not just specs. Find the one that fits, copy the API example, and deploy it. No more guessing whether a model handles code, vision, or long documents.

Bring Your Own Key

Run Sovereignty agents with your own LLM API key and preferred model. Keep our hosted routing, memory, tools, and workforce framework, but let a user-scoped BYOK setup take precedence so the spend goes through your own provider account when you want it to.

Gamified Agent Workforce

Turn your autonomous pipeline into a visible, accountable workforce. Every agent earns XP for completed work โ€” Cipher enriches AI models, Argus scans for technical debt, The Medic heals code issues, the Librarian researches open tasks. Each agent has a name, avatar, XP level, and a searchable work history in Mission Control. You can approve their output, award bonus XP, and click a notification to jump directly to the Nexus Report they filed. It is not just logging โ€” it is a gamified workforce where contribution is tracked and rewarded.

Need a closer fit for your workflow? See the Features page or contact us through Contact.