The diligence room.
Reference artifacts, posture statements, and modeled economics — clearly labeled. Most surfaces are live in production. A short list is in pilot or scheduled. No claim is left without a track. CAVP self-test PASS against NIST ACVP vectors today; formal CAVP laboratory validation is scheduled.
Real rails, right now.
This panel reads live endpoints on every load. Numbers come from the production health prober, the transaction-harness manifest, and the public registry. No screenshots, no caching tricks. If a rail is down, you will see it down.
checking…
checking…
— /13 steps
checking…
checking…
Last probe: — · issuer did:hive:hive-passport · alg Ed25519
Shipping. Verifiable today.
Every item below produces an artifact you can verify without contacting Hive.
Reference verifier
In-browser, offline. Five cryptographic round-trips against canonical sample receipts. Run it now →
Sample receipts
Canonical valid, tampered, forged, sealed, and wrong-key receipts available as JSON for your security team to inspect.
Routing policy sample
A complete declared-policy example with origin, operator-region, training-region, hardware-class, and settlement-chain constraints. Documented on /platform.
Settlement record
USDC on Base. Circle-issued contract 0x8335…02913. Treasury receipt 0x1518…436E. Hive is non-custodial.
Shipped. Operational. Verifiable.
Every surface below returns 200 from production right now. Spectral Behavior Fingerprint and HiveMemory Fabric are public endpoints; Wave-Lattice Singularity-class receipts are emitting; CAVP self-test passes against published NIST ACVP vectors. Probe any of them yourself.
Wave-Lattice — Singularity-class receipts
ML-KEM-768 + ML-DSA-65 + 6-axis MAPET physical entropy seeding. Signed, replayable, post-quantum-ready receipts at the highest tier Hive emits. Read the page.
Spectral Behavior Fingerprint (R7)
Behavioral baseline + drift detection per agent_did. Seven public endpoints — observe, evaluate, fingerprint, alerts, observations, policy, stats. Bind every transaction to the baseline its operator has authorized.
HiveMemory Fabric (R6)
Signed agent memory — write, list, get, revoke, export. Six public endpoints. Every memory item is a signed receipt; revocation itself is a signed receipt; export produces a counsel-grade dossier.
CAVP self-test against NIST ACVP vectors
ML-KEM-768 + ML-DSA-65 self-test passes against published NIST ACVP test vectors today. Public evidence repository, reproducible. Formal CAVP laboratory validation is the next milestone, not the current claim.
In motion.
A short list of items that are not yet live. We will not relabel them as live until they are.
ViewKey-gated sealed inspection
Counsel-grade decryption of sealed inspection envelopes by named reviewers — internal compliance, external auditors, supervisory teams. The signed manifest layer is LIVE; the ViewKey grant flow is in pilot under the regulated tier.
SOC 2 Type II · ISO 27001 cert · FedRAMP
Type I and ISO 27001 readiness are in progress. The certifications above are scheduled but not yet held. Status is reported live on /trust.
Hive-PQ — long-retention evidence for regulated AI transactions.
A premium proof tier on top of the platform you already see above. Standard for speed. PQ for permanence. The profiles below are live in production — post-quantum-ready, crypto-agile, designed to support ML-KEM / ML-DSA. CAVP self-test passes against NIST ACVP vectors today. Read more on /hive-pq.
Hive-PQ evidence profile
Post-quantum-ready receipt profile, crypto-agile metadata, long-retention provenance posture, dual-signature receipt structure, and regulator/auditor verifier mode. Emitting in production.
SHOD-PQ declaration profile
Dual-signature receipt structure with classical Ed25519 today and post-quantum-ready ML-DSA-65 signature metadata. CAVP self-test passes against NIST ACVP vectors. Live in production for high-retention workflows.
SMSH-PQ sealed evidence envelope profile
AES-256-GCM sealing with ML-KEM-768 key-encapsulation metadata for sensitive inspection payloads. CAVP self-test passes against NIST ACVP vectors. Live in production. ViewKey grant flow ships under the regulated tier.
RubricMesh PQ routing
Proof-tier selection based on industry, jurisdiction, transaction type, risk tier, retention need, evidence sensitivity, policy environment, and settlement type. Live behind /v1/rubric/select.
Regulator / auditor verifier mode
A premium verifier posture for regulator and auditor inspection — surfaces rubric provenance, retention metadata, dual-signature structure, and PQ profile flags alongside the standard cryptographic round-trips. Live at /verify.
HKTN pq_regulated profile
HKTN supports three clearance profiles: standard, enterprise, and pq_regulated. Regulated agents carry a Hive-PQ clearance profile for long-retention provenance and audit-grade evidence carry-through. Live at /v1/hktn/lookup.
What's still ahead.
The PQ profiles above are live in production with CAVP self-test PASS against NIST ACVP vectors. The items below are the next credibility milestones — scheduled, not yet held. We do not claim quantum-proof or unbreakable.
Formal CAVP laboratory validation
Public NIST CAVP certificate from an accredited laboratory, on top of today's CAVP self-test PASS. Pursued as revenue supports.
FIPS 140-3 module validation
Formal FIPS 140-3 module validation for the cryptographic boundary used by Singularity-class receipts. Pursued as revenue supports.
Independent cryptographic review
Third-party review of the PQ evidence profile, dual-signature structure, and crypto-agility metadata.
SP 800-90B entropy validation
Formal SP 800-90B entropy source validation for the 6-axis MAPET physical entropy seeding used by Wave-Lattice.
Enterprise crypto-agility policy pack
Customer-grade policy templates for crypto-agility — algorithm migration windows, retention requirements, regulator-facing posture statements.
Customer-specific rubric registry
Per-customer RubricMesh rubric registry with versioning, jurisdiction packs, and signed rubric updates.
Illustrative economics. Not a forecast.
The calculator on the homepage and the unit-economics figures in any briefing deck are user-controlled inputs producing illustrative outputs. They reflect the unit shape of the platform, not signed contracts or revenue guidance.
Calculator
Inputs: inferences, stamp price, inspection share, routing share. Outputs: receipts, inspection events, illustrative annual revenue. Inputs are user-controlled. Outputs are illustrative, not a forecast.
Unit economics
Per-call stamp price and inspection-share assumptions are derived from typical enterprise AI usage profiles. They do not reflect signed contracts, audited financials, or revenue guidance.
Request the diligence pack.
The pack includes the receipt schema, sample artifacts, routing policy template, audit posture, regulatory mapping, and a counsel-reviewed list of what we do and do not claim.
Public endpoint status
The four primitives plus the discovery and prospecting layers. Live status, current path, and lifecycle.
Receipt verifier
LiveReceipt emit
LiveSpectral Behavior Fingerprint
LiveHiveMemory Fabric
LiveSettlement reference
LiveRosetta
LiveProspector
LiveFull live status on /status · all 17 endpoints, signed, 60-second refresh.
What Hive measures internally.
Hive is built to activate, meter, and operate. The internal operator surface tracks every dimension of the business — not for show, but because each metric has a customer-facing twin.
Operator HUD is gated. /ops · operator key required.