EVALUATE FOR FREE.
Clone the template repository. Run it locally. See four governance layers enforce every tool call in minutes. No sales call, no time limit.
What is systemprompt.io
systemprompt.io is self-hosted AI governance infrastructure. It is a single Rust binary (under 50MB) that governs every AI tool call your agents make. It is not a SaaS product. It is not a framework. It is infrastructure you own, run on your servers, and extend with your own code.
Every tool call passes through four enforcement layers before execution: scope-based access control, secret detection, rate limiting, and an immutable audit trail. The governance evaluation completes in under 5 milliseconds. No perceptible latency. No performance tax on your AI workflow.
PostgreSQL is the only external dependency. The binary handles HTTP serving, MCP governance, agent orchestration, content management, analytics, and background jobs. What others assemble from six services, this ships as one.
- One Binary, Complete Stack — Under 50MB of compiled Rust. HTTP server, MCP governance, agent orchestration, analytics, content management, and background jobs in a single process.
- Four Governance Layers — Scope-based access control, secret detection, rate limiting, and immutable audit trail. Every tool call. Every agent. Every time.
- Self-Hosted, Air-Gap Capable — Runs on your infrastructure, in your network, behind your firewall. Zero outbound connections required. Your data never leaves your environment.
- Provider Agnostic — Claude, Codex, Gemini, or your own custom agents. The governance pipeline treats every provider identically.
Getting Started in Five Minutes
The template repository is the fastest path from zero to governed AI agents. It includes a pre-configured binary, sample governance rules, and everything you need to see the enforcement pipeline in action.
Prerequisites
You will need Git, the Rust toolchain (rustup.rs), and PostgreSQL 15+ running locally or accessible over the network. The build compiles to a single binary with no runtime dependencies beyond PostgreSQL.
Clone and Build
git clone https://github.com/systempromptio/systemprompt-template.git
cd systemprompt-template
cargo build --release
Configure
Copy the example environment file and set your database connection string. The template ships with sensible defaults. You only need to configure PostgreSQL credentials and your AI provider API key.
cp .env.example .env
# Edit .env with your PostgreSQL connection string
# Add your Anthropic API key (or other provider)
Run
./target/release/systemprompt serve
The server starts on port 3000 by default. Hit the health endpoint to verify everything is running:
curl http://localhost:3000/health
You should see a JSON response confirming the server is ready and the database is connected. From here, every AI tool call through this server is governed.
- Clone the Repository — One git clone. The template includes everything: binary source, configuration, sample agents, and governance rules.
- Build with Cargo — Standard Rust toolchain. cargo build --release produces a single binary under 50MB with zero runtime dependencies beyond PostgreSQL.
- Configure and Run — Set your database URL and API key in .env. Start the server. Hit /health to confirm. You are now governing AI tool calls.
What to Evaluate
The template ships with pre-configured governance rules that demonstrate every enforcement layer. Here is what to look for during your evaluation and how to test each capability.
Governance Pipeline
Connect an AI agent and make a tool call. Watch the governance pipeline evaluate scope, scan for secrets, enforce rate limits, and record the decision, all in under 5 milliseconds. Try calling the same tool with different agent scopes: admin-scope agents pass, user-scope agents are denied. The enforcement is immediate and deterministic.
Secret Scanning
Inject a test credential into a tool call input: an AWS access key, a GitHub token, or a PEM private key. The secret scanner blocks the call before it reaches any external service. The credential never leaves the governance layer. Check the audit trail to see exactly which pattern matched and why the call was denied.
Audit Trail
Every governance decision is recorded with the full evaluation context: which agent, which tool, which rules fired, what policy matched, and why. Query the audit trail through the CLI or API. Export it to your SIEM. This is the evidence your security team reviews during an audit.
Cost Attribution
Every AI request is attributed to its agent with token counts, model, latency, and cost. Run multiple agents and check the per-agent cost breakdown. No hidden spend. No shared buckets. Every token accounted for.
- Governance Pipeline — Four enforcement layers on every tool call. Test scope-based allow and deny decisions with different agent roles.
- Secret Scanning — Inject test credentials and watch them get blocked. AWS keys, GitHub tokens, PEM keys, and API secrets, all caught before they reach any tool.
- Audit Trail — Query every governance decision via CLI or API. Full context: agent, tool, policy match, reason, timestamp. Export to your SIEM.
- Cost Attribution — Per-agent token counts, model selection, latency, and cost. Every AI request attributed. No hidden spend.
What the Template Repository Includes
The template is not a toy example. It is a production-ready starting point that compiles into your own binary. Everything inside is yours to own, modify, and extend.
Configuration Layer
All governance rules, agent definitions, and server settings are YAML files checked into Git. No database configuration. No admin panels. Your infrastructure-as-code workflow applies directly. Review governance changes in pull requests. Roll back with git revert.
Pre-Configured Agents
The template ships with sample agents at different scope levels: admin, user, and restricted. Each agent has different tool access permissions so you can immediately test the governance pipeline's scope enforcement without writing any configuration from scratch.
MCP Server Registry
MCP servers are registered, authenticated, and governed. The template includes example server registrations with per-server OAuth2 configuration. Every tool call through every MCP server passes through the same governance pipeline.
Extension Points
systemprompt.io is a library, not a framework. Add custom API routes, database tables, background jobs, and page providers through Rust extension traits. Your code compiles into your binary. No plugin runtime. No performance overhead. No version conflicts.
- YAML Configuration — Governance rules, agent definitions, and server settings as version-controlled YAML. Review changes in pull requests, roll back with git revert.
- Sample Agents — Pre-configured agents at admin, user, and restricted scope levels. Test governance enforcement immediately without writing configuration.
- MCP Server Registry — Registered, authenticated, and governed MCP servers with per-server OAuth2. Every tool call governed through the same pipeline.
- Rust Extension Traits — Add routes, tables, jobs, and providers through traits. Your code compiles into your binary. No plugin runtime, no overhead.
Ready to Go Deeper
The evaluation is just the beginning. Once you have seen the governance pipeline in action, there are several paths forward depending on your needs.
Self-Guided
The documentation covers deployment, configuration, extensions, and every service in the binary. The guides walk through specific workflows like connecting MCP servers, configuring compliance rules, and setting up analytics exports. The live demo shows four governance layers executing in real time in under six minutes.
Talk to the Founder
For teams evaluating enterprise deployment, custom integrations, or commercial licensing, book a 30-minute technical call below. Discuss your architecture, compliance requirements, and deployment timeline directly with the person who built it.
- Documentation — Deployment guides, API reference, and configuration for every domain in the binary.
- Guides — Step-by-step tutorials for MCP governance, compliance configuration, analytics exports, and more.
- Live Demo — Watch four governance layers execute in real time. Six minutes from cold start to governed AI agents.
Let's talk
your implementation
Discuss technical implementation, enterprise licensing, or custom integrations with the founder. For teams that have evaluated the template and are ready to move forward.
-
Technical implementation Deployment architecture, IdP integration, SIEM pipelines, and custom extensions
-
Enterprise licensing Volume licensing, SLA guarantees, and perpetual licence terms under BSL-1.1
-
Custom integrations Rust extensions, custom governance rules, and provider-specific configurations
30 minutes with the founder. For teams ready to move beyond evaluation.
You're in. Check your inbox.
We've sent you an email with a link to book your 30-minute call. Check your inbox.
While you wait: How to roll out Claude across your organisationFounder-led. Self-service first.
No sales team. No demo theatre. The template is free to evaluate — if it solves your problem, we talk.
Who we are
One founder, one binary, full IP ownership. Every line of Rust, every governance rule, every MCP integration — written in-house. Two years of building AI governance infrastructure from first principles. No venture capital dictating roadmap. No advisory board approving features.
How to engage
Evaluate
Clone the template from GitHub. Run it locally with Docker or compile from source. Full governance pipeline.
Talk
Once you have seen the governance pipeline running, book a meeting to discuss your specific requirements — technical implementation, enterprise licensing, or custom integrations.
Deploy
The binary and extension code run on your infrastructure. Perpetual licence, source-available under BSL-1.1, with support and update agreements tailored to your compliance requirements.
Start your evaluation today
The binary you evaluate is the binary you deploy. No demo mode, no feature flags, no surprises.