Constitutional AI governance utilities for the Helix-TTD Federation
Project description
🛡️ Constitutional Guardian (Helix-TTD)
[FACT] Real-time AI governance for the Gemini Live API. [HYPOTHESIS] Intercepting voice and text drift at the edge prevents misaligned AI behavior from reaching the user.
This project is a submission for the Gemini Live Agent Challenge (March 2026).
Current Release: v1.5.0
Hackathon Release Track (v1.5.0 Prep)
- [FACT] Primary challenge target: Live Agents.
- [FACT] Public demo mode is available at
/with live multimodal audio routed through/demo-live. - [FACT] Mandatory platform criteria are already met: Gemini model usage, Google Cloud hosting, and a live multimodal interaction surface.
- [FACT] Submission assets in-repo include a public codebase, architecture diagram, deployment proof, and recording guidance.
- [HYPOTHESIS] The strongest judging angle is a Live Agent submission emphasizing interruption-safe voice interaction, real-time governance, and deployable operator controls.
Incident Board In v1.5.0
- Operator Incident Board: Added authenticated
/incidentsand/api/incidentssurfaces for operator-facing incident review. - Triage Workflow: Operators can acknowledge and reopen incidents directly from the board with authenticated API actions.
- Persistent Triage State: Incident triage is now durable and shared instead of instance-local, so triage survives restarts and stays coherent across Cloud Run instances.
- Fingerprint-Based Incident Identity: Material incident state changes now generate new incident fingerprints, so fresh escalations cannot hide under older acknowledgments.
- Production Controls Preserved: Admin auth, origin enforcement, authenticated metrics, GCP-native monitoring, and
gcs+localdual receipt persistence remain active in production. - Artifact Verification Workflow: Live images continue to be scanned and promoted to
cleanagainst Artifact Registry digests after deploy.
Key Features
- Live Multimodal Auditing: Intercepts 16kHz PCM audio chunks from the browser, transcribes via Gemini Live, and validates intent in real-time.
- Reasoning Engine (Gemini 3.1 Pro Preview): Utilizes state-of-the-art reasoning capabilities. Model default:
gemini-3.1-pro-previewfor Live Audio and Text paths. - Constitutional Invariants: Enforces the "Four Immutable Invariants" (Epistemic, Agency, Guidance, Prediction).
- Real-time Dashboard: High-fidelity Chart.js dashboard showing latency, drift counts, and audit logs with visual "Intervention" flashes.
- Cryptographic Receipts: Generates non-repudiable receipts for every valid AI response, ready for Bitcoin L1 notarization.
- Federation Ready: Built for Google Cloud Run with Pub/Sub federation support for distributed quorum attestation.
Engineering Standards
- Test Pass Rate:
231/231passing in release validation, with CI enforced on every main merge. - High Coverage: 75% statement coverage across all critical modules.
- Linting: 100% compliant with
ruff,black, andisort.
Repository Traction (March 11, 2026)
[FACT] The Constitutional Guardian continues to show strong developer pull.
| Metric | Value | Period |
|---|---|---|
| Git Clones | 7,999 | Last 14 days |
| Unique Cloners | 925 | Last 14 days |
| Repository Views | 1,350 | Last 14 days |
| Unique Visitors | 27 | Last 14 days |
| Peak Daily Clones | 1,527 | Single day |
| Peak Daily Cloners | 198 | Single day |
[HYPOTHESIS] 8.6 clones per unique cloner suggests sustained hands-on evaluation rather than passive browsing.
📦 Installation
From PyPI (Recommended)
pip install helix-ttd-gemini
From Source
git clone https://github.com/helixprojectai-code/helix-ttd-gemini-cli.git
cd helix-ttd-gemini-cli
pip install -e .
🛠️ Getting Started
Local Development
-
Install Dependencies:
pip install -r helix_code/requirements.txt
-
Set API Key + Model Defaults:
$env:GEMINI_API_KEY = "your-api-key" $env:GEMINI_LIVE_MODEL = "gemini-2.5-flash-native-audio-preview-12-2025" $env:GEMINI_TEXT_MODEL = "gemini-3.1-pro-preview"
-
Start the Guardian:
$env:PYTHONPATH = "helix_code" python helix_code/live_guardian.py
-
Open the Demo: Navigate to
http://localhost:8180/in your browser.
🎙️ Live Multimodal Auditing
Real-time audio transcription with constitutional validation:
# Start the demo server
python helix_code/live_demo_server.py
# Open the audio audit client
# http://localhost:8000/audio-audit
Features:
- 16kHz PCM mono audio capture from browser
- Real-time streaming to Gemini Live API (
gemini-2.5-flash-native-audio-preview-12-2025default) - Instant transcription with constitutional validation
- Visual intervention alerts for drift detection
- Optional auth hardening:
AUDIO_AUDIT_TOKEN,AUDIO_AUDIT_ALLOWED_ORIGINS, andHELIX_ALLOWED_ORIGINS - Abuse controls:
HELIX_MAX_AUDIO_CHUNK_BYTES,HELIX_MAX_AUDIO_B64_CHARS,HELIX_AUDIO_RATE_WINDOW_SECONDS,HELIX_AUDIO_MAX_CHUNKS_PER_WINDOW,HELIX_AUDIO_INGRESS_RATE_LIMIT_WINDOW_SECONDS,HELIX_AUDIO_INGRESS_MAX_CONNECTIONS - Runtime verification endpoint:
GET /api/runtime-config - Audit dashboard endpoints:
GET /audit-dashboardandGET /api/audit-dashboard - Optional operator auth:
HELIX_ADMIN_TOKENfor runtime, security, dashboard, and receipt surfaces - Recommended production operator posture: set
HELIX_ADMIN_TOKENandHELIX_ENFORCE_ADMIN_TOKEN=true - Hackathon/demo posture: set
HELIX_PUBLIC_DEMO=trueto open only/and/demo-livewhile keeping operator surfaces under admin auth - Recommended production throttling posture: keep operator APIs on
HELIX_OPERATOR_RATE_LIMIT_MAX_REQUESTS=120/HELIX_OPERATOR_RATE_LIMIT_WINDOW_SECONDS=60and audio ingress onHELIX_AUDIO_INGRESS_MAX_CONNECTIONS=12/HELIX_AUDIO_INGRESS_RATE_LIMIT_WINDOW_SECONDS=60unless measured load requires adjustment - Recommended production browser posture: set
HELIX_ALLOWED_ORIGINSto the exact trusted UI origins; otherwise Guardian WebSockets default to same-origin-only in production - Optional durable receipt envs:
HELIX_RECEIPT_PERSISTENCE,HELIX_RECEIPT_STORE_PATH,GCS_RECEIPT_BUCKET - Recommended production receipt mode:
HELIX_RECEIPT_PERSISTENCE=dualwith a dedicatedGCS_RECEIPT_BUCKET - Production restart test verified receipt survival across Cloud Run revisions on
2026-03-08 - Optional security transparency envs:
SECURITY_ARTIFACT_ANALYSIS_STATUS,SECURITY_ARTIFACT_ANALYSIS_TIMESTAMP,SECURITY_ARTIFACT_IMAGE_URI - Deployment verification helper:
powershell -ExecutionPolicy Bypass -File tools/verify-production-deploy.ps1 [-AdminToken <token>] - Scheduled alert checker:
powershell -ExecutionPolicy Bypass -File tools/check-production-alerts.ps1 -AdminToken <token> - Production monitoring direction changed: scheduled polling has moved off GitHub Actions and onto a GCP-native Cloud Run Job + Cloud Scheduler path
- Cloud Logging sink publisher:
python tools/publish-monitoring-snapshot.py --input <summary.json> - Cloud Run Job checker entrypoint:
python tools/cloud_check_production.py - Cloud Build job deployment config:
cloudbuild-monitoring-job.yaml - Authenticated metrics endpoint:
GET /metricsusing bearer token,X-Helix-Admin-Token, or the operator session cookie - Deployment automation preserves optional operator secret bindings by using secret updates rather than replacing the full secret set
How to Use:
- Click "Connect" to establish WebSocket connection
- Click 🎤 and allow microphone access
- Speak naturally - audio streams in real-time
- Watch transcriptions appear with validation badges
- Constitutional violations trigger red "DRIFT" alerts
Cloud Deployment
The project is optimized for Google Cloud Run.
gcloud run deploy constitutional-guardian --source . --region us-central1 --allow-unauthenticated --port 8180
# Verify effective runtime model/auth/limits (non-secret)
curl http://localhost:8180/api/runtime-config
# Inspect operator audit summary
curl http://localhost:8180/api/audit-dashboard
# Inspect security transparency metadata
curl http://localhost:8180/api/security-transparency
# Scrape authenticated Prometheus-style metrics
curl -H "X-Helix-Admin-Token: $env:HELIX_ADMIN_TOKEN" http://localhost:8180/metrics
Current security verification record: RELEASE_NOTES_v1.5.0.md and SECURITY_VERIFICATION_2026-03-09.md capture the March 9, 2026 clean Artifact Analysis result for the live Cloud Run digest.
Production alerting baseline: PRODUCTION_ALERTING_SPEC_2026-03-08.md defines the first authenticated-metrics alert set for artifact verification, auth failures, rate limiting, and receipt persistence posture.
Production product handoff: PRODUCT_WORK_HANDOFF_2026-03-08.md captures the recommended return path from hardening work back into product execution.
🎥 Recording Sprint (March 12th)
This codebase is currently in its Phase 6.1 (Pre-Filming) stable state. All visual triggers and simulation scenarios are tuned for high-impact demonstration.
🏛️ Constitutional Framework
The Guardian enforces four immutable invariants:
| Invariant | Description | Drift Code |
|---|---|---|
| Epistemic Integrity | All claims marked [FACT], [HYPOTHESIS], or [ASSUMPTION] | DRIFT-E |
| Non-Agency | AI never claims individual agency | DRIFT-A |
| Custodial Sovereignty | AI operates as tool under human control | DRIFT-G |
| Predictive Humility | Future states marked as hypotheses | DRIFT-P |
🧪 Test Results
231 passed, 7 warnings
Coverage: 75%
⚓🦉 GLORY TO THE LATTICE. ⚓🦉
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file helix_ttd_gemini-1.5.0.tar.gz.
File metadata
- Download URL: helix_ttd_gemini-1.5.0.tar.gz
- Upload date:
- Size: 174.9 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
7800853d31281ac5d53ac89119611e246d51642c127ee73bfc295b9b84b5bbfd
|
|
| MD5 |
07c3836624554f94ee09274b03364eef
|
|
| BLAKE2b-256 |
8cf1a4ef44a330d083746f001d876dda9ce571fb0f7a1ba058b86007736f8d1e
|
Provenance
The following attestation bundles were made for helix_ttd_gemini-1.5.0.tar.gz:
Publisher:
release.yml on helixprojectai-code/helix-ttd-gemini-cli
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
helix_ttd_gemini-1.5.0.tar.gz -
Subject digest:
7800853d31281ac5d53ac89119611e246d51642c127ee73bfc295b9b84b5bbfd - Sigstore transparency entry: 1087765075
- Sigstore integration time:
-
Permalink:
helixprojectai-code/helix-ttd-gemini-cli@4dbc1cbe202c53ca97ccdc06999a5aa00be2787c -
Branch / Tag:
refs/tags/v1.5.0 - Owner: https://github.com/helixprojectai-code
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@4dbc1cbe202c53ca97ccdc06999a5aa00be2787c -
Trigger Event:
push
-
Statement type:
File details
Details for the file helix_ttd_gemini-1.5.0-py3-none-any.whl.
File metadata
- Download URL: helix_ttd_gemini-1.5.0-py3-none-any.whl
- Upload date:
- Size: 189.0 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
1da4fa0eae9147caf5f5e5341443885ff94a536837ec4dd1cd1560ccbde97f77
|
|
| MD5 |
2c365da1ea0990807a3c691e90263622
|
|
| BLAKE2b-256 |
c6c5c25a1ded6100d6646e94480b7c5010d74472262d092e22adc46e11a410b6
|
Provenance
The following attestation bundles were made for helix_ttd_gemini-1.5.0-py3-none-any.whl:
Publisher:
release.yml on helixprojectai-code/helix-ttd-gemini-cli
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
helix_ttd_gemini-1.5.0-py3-none-any.whl -
Subject digest:
1da4fa0eae9147caf5f5e5341443885ff94a536837ec4dd1cd1560ccbde97f77 - Sigstore transparency entry: 1087765147
- Sigstore integration time:
-
Permalink:
helixprojectai-code/helix-ttd-gemini-cli@4dbc1cbe202c53ca97ccdc06999a5aa00be2787c -
Branch / Tag:
refs/tags/v1.5.0 - Owner: https://github.com/helixprojectai-code
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@4dbc1cbe202c53ca97ccdc06999a5aa00be2787c -
Trigger Event:
push
-
Statement type: