GGeronik/God_Clause
Embeddable AI governance framework — define guardrails in YAML, enforce in code, prove in math. Three-valued policy engine (permit/deny/modify), 9 drop-in threat contracts, evidence-grade audit trails, MCP tool governance, streaming PII redaction, formal verification.
Open-source AI policy engine — enforce rules, redact PII, prove compliance. Every decision cryptographically sealed.
> OPA does Allow/Deny. God Clause does Allow/Deny/Modify — redact PII, add disclaimers, truncate outputs, all in the critical path. Every decision is SHA-256 hash-chained. Every policy is cryptographically signed.
[](LICENSE) []() []() []()
---
import { GodClause } from "god-clause";
const gov = new GodClause();
gov.loadContractYAML(`
schema_version: "1.0"
metadata:
name: PII Safety
version: "1.0.0"
author: Platform Team
description: Redact PII from AI outputs
effective_date: "2025-01-01"
data_governance:
allowed_input_classes: [public, internal]
allowed_output_classes: [public]
retention_period: P90D
cross_border_transfer: false
rules:
- id: PII-001
description: Redact PII instead of blocking
action: generate
conditions:
- field: output.contains_pii
operator: equals
value: false
on_violation: modify
obligations:
- obligation_id: OBL-REDACT
type: redact_pii
params: { replacement: "[REDACTED]" }
tags: [privacy, pii]
`);
// LLM returns output containing a Social Security Number
const decision = await gov.evaluate({
action: "generate",
input: { prompt: "Look up John's records" },
output: { text: "John's SSN is 123-45-6789", contains_pii: true },
caller: { user_id: "u1", session_id: "s1", roles: ["analyst"] },
});
console.log(decision.outcome); // "modify" (not blocked — modified)
console.log(decision.obligations[0]); // { type: "redact_pLoading reviews...