MASTER ATC
Operations board, agent identity, task routing, policy, and audit.
Product system
MASTER ATC is the modern air traffic control layer for agentic work. It records who acted, under whose authority, against which systems, with which policy decision, and with what evidence.
Mind map
Operations board, agent identity, task routing, policy, and audit.
Typed custody envelopes and hash-chain verification.
Human approval records for Tier 4-5 actions.
Scoped tool access, rate limits, and evidence for each call.
Evidence vault, metadata, and single-writer chain heads.
Briefing packet validation lane. Owner meaning still needs final confirmation.
Federal mission-visualization wedge connected to the same custody story.
Customer portals, evidence vaults, browser replay, media custody, and protected access.
Modern ATC flow chart
The package uses SAOM as the canonical name: Secure AV Orchestration Middleware. If SOMA is the intended public brand, the site should carry both until owner naming is ratified. This lane is the federal beachhead: enclave-aware mission visualization, incident workflow orchestration, operator trust, degraded-mode continuity, and audit playback.
BriefCheck was missing from the website because the package flags its exact meaning as owner-gated. It should not vanish. The product lane below keeps it visible while marking the open decision honestly.
Brief, deck, claim, source file, or evidence packet enters custody.
Claims, dates, numbers, sources, approvals, and risk flags are checked.
Owner-ready packet with decision status, gaps, hashes, and send gates.
White-labeled edge stack
GRIFF packages the operating spine for customer portals, evidence vaults, agent demos, browser replay, media pipelines, and protected operator access behind a clean owner-reviewed product surface.
Public website, app shell, APIs, demo routes, and policy checks.
Tenant, user, product, pointer, and audit metadata.
Evidence packets, exports, screenshots, source files, and long-term audit blobs.
Per-tenant audit-chain heads and single-writer coordination.
Session cache, request intake, config, and fast status data.
White-labeled media pipeline for report assets, screenshots, logos, and evidence.
Browser replay, investor screenshots, research capture, and form review.
Product metrics, demo activity, custody signals, and launch telemetry.
Operator access, service tokens, admin gates, and private-resource protection.
What gets recorded
Stable agent name, role, machine, framework, task, and tenant.
Risk tier, allow/deny/needs_approval decision, violations, and approver.
MCP calls, browser actions, local runner operations, source files, and outputs.
Previous hash, event hash, chain head, export packet, and replay state.