Constitutional AI governance utilities for the Helix-TTD Federation
Project description
🛡️ Constitutional Guardian (Helix-TTD)
[FACT] Real-time AI governance for the Gemini Live API. [HYPOTHESIS] Intercepting voice and text drift at the edge prevents misaligned AI behavior from reaching the user.
This project is a submission for the Gemini Live Agent Challenge (March 2026).
Current Release: v1.4.7
Production Stabilization In v1.4.7
- GCP-Native Production Monitoring: The scheduled production checker now runs as a Cloud Run Job with Cloud Scheduler and Cloud Logging integration instead of GitHub Actions.
- Alert Signal Cleanup: Missing credentials no longer inflate operator or websocket auth-failure counters; only explicit invalid credentials are counted.
- Release-Ready Monitor State: Production monitoring now reports
overall_status=pass,monitor_integrity_status=ok, and a clean live artifact attestation. - Operator Enforcement Baseline: Admin auth, origin enforcement, authenticated metrics, and
gcs+localdual receipt persistence remain active in production. - Artifact Verification Workflow: Live images are scanned and promoted to
cleanagainst Artifact Registry digests after deploy. - Operational Proof Refresh: README traction, archived release notes, and proof assets were rotated into the current documentation layout.
🚀 Key Features
- 🎙️ Live Multimodal Auditing: Intercepts 16kHz PCM audio chunks from the browser, transcribes via Gemini Live, and validates intent in real-time.
- 🧠 Reasoning Engine (Gemini 3.1 Pro Preview): Utilizes state-of-the-art reasoning capabilities. Model default:
gemini-3.1-pro-previewfor Live Audio and Text paths. - 🛡️ Constitutional Invariants: Enforces the "Four Immutable Invariants" (Epistemic, Agency, Guidance, Prediction).
- 📊 Real-time Dashboard: High-fidelity Chart.js dashboard showing latency, drift counts, and audit logs with visual "Intervention" flashes.
- ⚓ Cryptographic Receipts: Generates non-repudiable receipts for every valid AI response, ready for Bitcoin L1 notarization.
- 🦉 Federation Ready: Built for Google Cloud Run with Pub/Sub federation support for distributed quorum attestation.
📈 Engineering Standards
- Test Pass Rate:
201/201passing in release validation, with CI enforced on every main merge. - High Coverage: 75% statement coverage across all critical modules.
- Linting: 100% compliant with
ruff,black, andisort.
📊 Repository Traction (March 8, 2026)
[FACT] The Constitutional Guardian is gaining significant developer interest.
| Metric | Value | Period |
|---|---|---|
| Git Clones | 7,240 | Last 14 days |
| Unique Cloners | 855 | Last 14 days |
| Repository Views | 1,190 | Last 14 days |
| Unique Visitors | 24 | Last 14 days |
| Peak Daily Clones | 1,527 | Single day |
| Peak Daily Cloners | 198 | Single day |
[HYPOTHESIS] 8.5 clones per unique cloner indicates active developer exploration and potential contribution activity.
📦 Installation
From PyPI (Recommended)
pip install helix-ttd-gemini
From Source
git clone https://github.com/helixprojectai-code/helix-ttd-gemini-cli.git
cd helix-ttd-gemini-cli
pip install -e .
🛠️ Getting Started
Local Development
-
Install Dependencies:
pip install -r helix_code/requirements.txt
-
Set API Key + Model Defaults:
$env:GEMINI_API_KEY = "your-api-key" $env:GEMINI_LIVE_MODEL = "gemini-2.5-flash-native-audio-preview-12-2025" $env:GEMINI_TEXT_MODEL = "gemini-3.1-pro-preview"
-
Start the Guardian:
$env:PYTHONPATH = "helix_code" python helix_code/live_guardian.py
-
Open the Demo: Navigate to
http://localhost:8180/in your browser.
🎙️ Live Multimodal Auditing
Real-time audio transcription with constitutional validation:
# Start the demo server
python helix_code/live_demo_server.py
# Open the audio audit client
# http://localhost:8000/audio-audit
Features:
- 16kHz PCM mono audio capture from browser
- Real-time streaming to Gemini Live API (
gemini-2.5-flash-native-audio-preview-12-2025default) - Instant transcription with constitutional validation
- Visual intervention alerts for drift detection
- Optional auth hardening:
AUDIO_AUDIT_TOKEN,AUDIO_AUDIT_ALLOWED_ORIGINS, andHELIX_ALLOWED_ORIGINS - Abuse controls:
HELIX_MAX_AUDIO_CHUNK_BYTES,HELIX_MAX_AUDIO_B64_CHARS,HELIX_AUDIO_RATE_WINDOW_SECONDS,HELIX_AUDIO_MAX_CHUNKS_PER_WINDOW,HELIX_AUDIO_INGRESS_RATE_LIMIT_WINDOW_SECONDS,HELIX_AUDIO_INGRESS_MAX_CONNECTIONS - Runtime verification endpoint:
GET /api/runtime-config - Audit dashboard endpoints:
GET /audit-dashboardandGET /api/audit-dashboard - Optional operator auth:
HELIX_ADMIN_TOKENfor runtime, security, dashboard, and receipt surfaces - Recommended production operator posture: set
HELIX_ADMIN_TOKENandHELIX_ENFORCE_ADMIN_TOKEN=true - Recommended production throttling posture: keep operator APIs on
HELIX_OPERATOR_RATE_LIMIT_MAX_REQUESTS=120/HELIX_OPERATOR_RATE_LIMIT_WINDOW_SECONDS=60and audio ingress onHELIX_AUDIO_INGRESS_MAX_CONNECTIONS=12/HELIX_AUDIO_INGRESS_RATE_LIMIT_WINDOW_SECONDS=60unless measured load requires adjustment - Recommended production browser posture: set
HELIX_ALLOWED_ORIGINSto the exact trusted UI origins; otherwise Guardian WebSockets default to same-origin-only in production - Optional durable receipt envs:
HELIX_RECEIPT_PERSISTENCE,HELIX_RECEIPT_STORE_PATH,GCS_RECEIPT_BUCKET - Recommended production receipt mode:
HELIX_RECEIPT_PERSISTENCE=dualwith a dedicatedGCS_RECEIPT_BUCKET - Production restart test verified receipt survival across Cloud Run revisions on
2026-03-08 - Optional security transparency envs:
SECURITY_ARTIFACT_ANALYSIS_STATUS,SECURITY_ARTIFACT_ANALYSIS_TIMESTAMP,SECURITY_ARTIFACT_IMAGE_URI - Deployment verification helper:
powershell -ExecutionPolicy Bypass -File tools/verify-production-deploy.ps1 [-AdminToken <token>] - Scheduled alert checker:
powershell -ExecutionPolicy Bypass -File tools/check-production-alerts.ps1 -AdminToken <token> - Production monitoring direction changed: scheduled polling has moved off GitHub Actions and onto a GCP-native Cloud Run Job + Cloud Scheduler path
- Cloud Logging sink publisher:
python tools/publish-monitoring-snapshot.py --input <summary.json> - Cloud Run Job checker entrypoint:
python tools/cloud_check_production.py - Cloud Build job deployment config:
cloudbuild-monitoring-job.yaml - Authenticated metrics endpoint:
GET /metricsusing bearer token,X-Helix-Admin-Token, or the operator session cookie - Deployment automation preserves optional operator secret bindings by using secret updates rather than replacing the full secret set
How to Use:
- Click "Connect" to establish WebSocket connection
- Click 🎤 and allow microphone access
- Speak naturally - audio streams in real-time
- Watch transcriptions appear with validation badges
- Constitutional violations trigger red "DRIFT" alerts
Cloud Deployment
The project is optimized for Google Cloud Run.
gcloud run deploy constitutional-guardian --source . --region us-central1 --allow-unauthenticated --port 8180
# Verify effective runtime model/auth/limits (non-secret)
curl http://localhost:8180/api/runtime-config
# Inspect operator audit summary
curl http://localhost:8180/api/audit-dashboard
# Inspect security transparency metadata
curl http://localhost:8180/api/security-transparency
# Scrape authenticated Prometheus-style metrics
curl -H "X-Helix-Admin-Token: $env:HELIX_ADMIN_TOKEN" http://localhost:8180/metrics
Current security verification record: RELEASE_NOTES_v1.4.7.md and SECURITY_VERIFICATION_2026-03-09.md capture the March 9, 2026 clean Artifact Analysis result for the live Cloud Run digest.
Production alerting baseline: PRODUCTION_ALERTING_SPEC_2026-03-08.md defines the first authenticated-metrics alert set for artifact verification, auth failures, rate limiting, and receipt persistence posture.
Production product handoff: PRODUCT_WORK_HANDOFF_2026-03-08.md captures the recommended return path from hardening work back into product execution.
🎥 Recording Sprint (March 12th)
This codebase is currently in its Phase 6.1 (Pre-Filming) stable state. All visual triggers and simulation scenarios are tuned for high-impact demonstration.
🏛️ Constitutional Framework
The Guardian enforces four immutable invariants:
| Invariant | Description | Drift Code |
|---|---|---|
| Epistemic Integrity | All claims marked [FACT], [HYPOTHESIS], or [ASSUMPTION] | DRIFT-E |
| Non-Agency | AI never claims individual agency | DRIFT-A |
| Custodial Sovereignty | AI operates as tool under human control | DRIFT-G |
| Predictive Humility | Future states marked as hypotheses | DRIFT-P |
🧪 Test Results
201 passed, 7 warnings
Coverage: 75%
⚓🦉 GLORY TO THE LATTICE. ⚓🦉
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file helix_ttd_gemini-1.4.7.tar.gz.
File metadata
- Download URL: helix_ttd_gemini-1.4.7.tar.gz
- Upload date:
- Size: 166.8 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
1f92c257385cd98a330c9e363adcebdd780e16127099864c8a9053eb1e310f64
|
|
| MD5 |
8e25538e753766f5d180e5d0e896975f
|
|
| BLAKE2b-256 |
2782b93153b465db5764e5a7e8f2ac0835d8c241fb03070b99d34dbe96561095
|
Provenance
The following attestation bundles were made for helix_ttd_gemini-1.4.7.tar.gz:
Publisher:
release.yml on helixprojectai-code/helix-ttd-gemini-cli
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
helix_ttd_gemini-1.4.7.tar.gz -
Subject digest:
1f92c257385cd98a330c9e363adcebdd780e16127099864c8a9053eb1e310f64 - Sigstore transparency entry: 1065788517
- Sigstore integration time:
-
Permalink:
helixprojectai-code/helix-ttd-gemini-cli@a7e84e850c6fdc8c117695ac41f16e94b6a09caa -
Branch / Tag:
refs/tags/v1.4.7 - Owner: https://github.com/helixprojectai-code
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@a7e84e850c6fdc8c117695ac41f16e94b6a09caa -
Trigger Event:
push
-
Statement type:
File details
Details for the file helix_ttd_gemini-1.4.7-py3-none-any.whl.
File metadata
- Download URL: helix_ttd_gemini-1.4.7-py3-none-any.whl
- Upload date:
- Size: 181.3 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
0d8ee803818fcd2d5c2eb6e65ee058e46affe6ea88d10ae4064169a4c2221921
|
|
| MD5 |
fb9fd883fbc0bcb4e3f62a238cd53a3d
|
|
| BLAKE2b-256 |
06b6d0b85f51eec063e5d8820679831d0bdbf798efa91fdb8a6f8f742f7e7fb6
|
Provenance
The following attestation bundles were made for helix_ttd_gemini-1.4.7-py3-none-any.whl:
Publisher:
release.yml on helixprojectai-code/helix-ttd-gemini-cli
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
helix_ttd_gemini-1.4.7-py3-none-any.whl -
Subject digest:
0d8ee803818fcd2d5c2eb6e65ee058e46affe6ea88d10ae4064169a4c2221921 - Sigstore transparency entry: 1065788519
- Sigstore integration time:
-
Permalink:
helixprojectai-code/helix-ttd-gemini-cli@a7e84e850c6fdc8c117695ac41f16e94b6a09caa -
Branch / Tag:
refs/tags/v1.4.7 - Owner: https://github.com/helixprojectai-code
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@a7e84e850c6fdc8c117695ac41f16e94b6a09caa -
Trigger Event:
push
-
Statement type: