Skip to main content

Trust reporting and provenance enforcement for RAG pipelines. Audits claim grounding, source allowlists, and trust failures without an LLM call.

Project description

Dokis banner


PyPI Python CI License: MIT


The problem

Every RAG pipeline has the same failure mode. The LLM takes five retrieved chunks, ignores three of them, and generates a response that cites facts from nowhere. Your retriever did its job. Your prompt did its job. The output still contains unsourced claims and you have no way to know until a user catches it.

Existing tools don't solve this at runtime:

  • RAGAS evaluates offline. It can't catch a hallucination before it reaches a user.
  • LLM guardrails handle safety and policy enforcement well - toxicity, jailbreaks, off-topic content. Their provenance validators strip unsupported sentences but don't return a structured claim→URL map, a compliance rate, or a source allowlist.
  • Prompt engineering reduces the problem. It doesn't eliminate it.

Dokis sits inline between retrieval and response delivery and returns a runtime trust report for the exact answer your system is about to ship. It acts as a provenance and enforcement boundary in real time.


How it works

Dokis does two things in one deterministic runtime pass:

1. Pre-retrieval enforcement. Strip chunks whose source URL is not on your allowlist before they enter the prompt.

2. Post-generation auditing. Split the response into atomic claim sentences. Match each claim to the best supporting chunk using BM25 lexical scoring by default. Build a claim → chunk → URL provenance map. Compute a compliance rate. Return blocked-source details, claim-level verdicts, policy issues, and a final enforcement verdict.

No LLM call or API key is required for the default BM25 path. Output is deterministic for identical inputs and config.

Dokis architecture


See it in action

Dokis CLI demo


Quickstart

Zero config

import dokis

result = dokis.audit(query, chunks, response)

print(result.compliance_rate)   # 0.91
print(result.passed)            # True
print(result.provenance_map)    # {"Aspirin inhibits...": "https://pubmed.com/1"}
print(result.violations)        # claims with no source
print(result.claim_verdicts)    # explicit supported / unsupported report
print(result.policy_issues)     # [] | ["blocked_sources"] | ...
print(result.enforcement_mode)  # "guardrail"
print(result.enforcement_verdict)  # "passed"

CLI trust report

dokis audit sample_audit.json

The CLI reads a JSON file containing query, chunks, and response. If a provenance.toml file is present in the current directory or beside the input file, Dokis loads it automatically so the report reflects your real allowlist, threshold, matcher, and enforcement mode. Use --config path/to/file.toml to override that discovery. Use --no-color for plain output. Exit code is 0 when the audit passes, 1 when it fails policy/compliance checks, and 2 for CLI/input errors.

With config

import dokis

config = dokis.Config(
    allowed_domains   = ["pubmed.ncbi.nlm.nih.gov", "cochrane.org"],
    min_citation_rate = 0.85,
    claim_threshold   = 0.3,
    enforcement_mode  = "guardrail",
)

clean_chunks = dokis.filter(raw_chunks, config)
response     = llm.invoke(build_prompt(query, clean_chunks))
result       = dokis.audit(query, clean_chunks, response, config=config)

if not result.passed:
    raise dokis.ComplianceViolation(result)

LangChain - two lines

from dokis.adapters.langchain import ProvenanceRetriever

retriever = ProvenanceRetriever(
    base_retriever=your_existing_retriever,
    config=dokis.Config(allowed_domains=["pubmed.ncbi.nlm.nih.gov"]),
)
docs = retriever.invoke(query)

LlamaIndex

from dokis.adapters.llamaindex import ProvenanceQueryEngine

engine = ProvenanceQueryEngine(
    base_engine=your_existing_engine,
    chunks=source_chunks,
    config=dokis.Config(min_citation_rate=0.80),
)
response = engine.query("What reduces fever?")
result   = response.metadata["provenance"]

CLI

dokis audit input.json
dokis audit input.json --config provenance.toml

dokis audit currently expects a file path. Stdin piping is not supported.

Reusable middleware (production pattern)

from dokis import ProvenanceMiddleware, Config

mw = ProvenanceMiddleware(Config(
    allowed_domains   = ["pubmed.ncbi.nlm.nih.gov", "cochrane.org"],
    min_citation_rate = 0.85,
    matcher           = "bm25",
    claim_threshold   = 0.3,
    enforcement_mode  = "guardrail",
))

result = mw.audit(query, chunks, response)

Async

result = await mw.aaudit(query, chunks, response)

Installation

pip install dokis                  # BM25 default, zero cold start
pip install dokis[semantic]        # adds SentenceTransformer matching
pip install dokis[nltk]            # adds NLTK sentence splitting
pip install dokis[langchain]       # adds LangChain ProvenanceRetriever
pip install dokis[llamaindex]      # adds LlamaIndex ProvenanceQueryEngine

Configuration

dokis.Config(
    allowed_domains   = [],
    min_citation_rate = 0.80,
    claim_threshold   = 0.35,
    extractor         = "regex",        # "regex" | "nltk" | "llm"
    matcher           = "bm25",         # "bm25" | "semantic"
    model             = "all-MiniLM-L6-v2",
    enforcement_mode  = "guardrail",    # "audit" | "guardrail" | "enforce"
    domain            = None,
)

fail_on_violation still works as a backwards-compatible alias for enforcement_mode="enforce", but enforcement_mode is the recommended interface for new configs and examples.

claim_threshold by matcher:

  • matcher="bm25": normalised per-query BM25 score. Recommended: 0.3–0.5.
  • matcher="semantic": cosine similarity. Recommended: 0.65–0.85.

Load from TOML:

# method is named from_yaml for backwards compatibility - pass a .toml file
config = dokis.Config.from_yaml("provenance.toml")

The result object

result.compliance_rate   # float
result.passed            # bool
result.violations        # list[Claim] (derived unsupported claims)
result.provenance_map    # dict[claim_text, source_url] (derived supported claims)
result.blocked_sources   # list[str] (backwards-compatible)
result.blocked_source_details  # list[BlockedSource]
result.claim_verdicts    # list[ClaimVerdict]
result.policy_issues     # ["blocked_sources", "unsupported_claims"]
result.has_blocked_sources     # bool
result.has_unsupported_claims  # bool
result.enforcement_mode        # "audit" | "guardrail" | "enforce"
result.enforcement_verdict     # "passed" | "..._failed" | "enforce_raised"
result.raised_on_violation     # bool
result.claims            # list[Claim] (full per-claim audit records)

claim.text               # str
claim.supported          # bool
claim.confidence         # float - always set, even when False
claim.source_url         # str | None
claim.source_chunk       # Chunk | None

blocked.url              # str
blocked.domain           # str | None
blocked.reason           # "domain_not_allowlisted" | "malformed_source_url" | "missing_source_url"

verdict.claim_text       # str
verdict.verdict          # "supported" | "unsupported"
verdict.confidence       # float
verdict.supporting_url   # str | None
verdict.note             # str | None

record = result.model_dump_json()  # fully JSON-serialisable trust report

Benchmarks

Measured on Python 3.12. Medians over 10 warm runs.

Cold start

Matcher Cold start What loads
bm25 (default) ~0 ms Nothing - pure Python
semantic ~1,666 ms all-MiniLM-L6-v2 (~80 MB)

Per-call audit latency (5 chunks, 3 claims)

Matcher Median p95
bm25 (default) 0.96 ms 1.29 ms
semantic 21.99 ms 31.45 ms

BM25 is 23× faster per audit call. The BM25 index is cached per chunk set - repeated calls against the same chunks stay sub-millisecond.

Install footprint

pip install dokis pip install dokis[semantic]
~42 MB (pydantic + numpy + bm25s) ~135 MB (+ model weights)

Accuracy (5 grounded + 5 ungrounded claims)

Matcher Grounded detected Ungrounded rejected
bm25 (default) 5/5 4/4 ✦
semantic 5/5 4/4 ✦

✦ One claim was 7 words - below the 8-word minimum - and filtered before matching. Effective ungrounded rejection rate is 100% for both matchers.


Comparison

Dokis RAGAS LLM guardrails
Runtime enforcement ❌ offline only
No LLM call needed partial ✦
Per-claim provenance map partial partial ✧
Source allowlisting
Compliance rate per response
LangChain integration ✅ drop-in retriever ✅ evaluation wrapper varies
JSON-serialisable audit log ✅ per-response
Cold start ~0 ms - varies
Core install size ~42 MB - -

✦ ProvenanceEmbeddings uses no LLM call. ProvenanceLLM requires one. ✧ Guardrails strips unsupported sentences from the response. Dokis returns a structured claim→URL map you can store and query.


Examples

Three working demos in dokis-examples:

  • 01 - Local files - txt files + BM25 + Ollama
  • 02 - Chroma vector store - Chroma + nomic-embed-text + Ollama
  • 03 - Live web search - Serper API + domain allowlisting + Ollama

Core dependencies

pip install dokis installs exactly three packages: pydantic>=2.0, numpy>=1.26, bm25s>=0.2.


License

MIT

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

dokis-0.1.2.tar.gz (44.1 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

dokis-0.1.2-py3-none-any.whl (34.2 kB view details)

Uploaded Python 3

File details

Details for the file dokis-0.1.2.tar.gz.

File metadata

  • Download URL: dokis-0.1.2.tar.gz
  • Upload date:
  • Size: 44.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for dokis-0.1.2.tar.gz
Algorithm Hash digest
SHA256 776bae515068951d6f455d41d33d5e1b8558945b78c9c6676ec6f6713a411af0
MD5 00467b046402515b1b9134fb416360aa
BLAKE2b-256 adc5fc934de222f4d1b5b4d7b294ac8909fbccce91cc02321f656d22ae6aefb5

See more details on using hashes here.

Provenance

The following attestation bundles were made for dokis-0.1.2.tar.gz:

Publisher: publish.yml on Vbj1808/Dokis

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file dokis-0.1.2-py3-none-any.whl.

File metadata

  • Download URL: dokis-0.1.2-py3-none-any.whl
  • Upload date:
  • Size: 34.2 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for dokis-0.1.2-py3-none-any.whl
Algorithm Hash digest
SHA256 f42cbfde34cb642d4f87ceb672c65469d2946f7e01dc3dea81e2d65c6af395af
MD5 ab621a67e7263b313dea3b15371152e3
BLAKE2b-256 ba4814e4d280221be7a31f867e6df860760febbb1566efb552e349ddc8f57328

See more details on using hashes here.

Provenance

The following attestation bundles were made for dokis-0.1.2-py3-none-any.whl:

Publisher: publish.yml on Vbj1808/Dokis

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page