Declare the mission
Write a YAML charter with the goal, tools, budget, approval threshold, sandbox, and required outputs.
A charter declares the goal, budget, tools, sandbox, and outputs. Praetor validates the mission, gates spend through MnemoPay, streams activity, and writes an audit trail your team can defend.
Praetor is already packaged, deployed, and wired to billing. The customer UI should make that obvious before anyone opens GitHub.
Customers should understand the product in four moves: declare, gate, execute, prove.
Write a YAML charter with the goal, tools, budget, approval threshold, sandbox, and required outputs.
FiscalGate routes paid tools through MnemoPay holds before work starts, so runaway missions hit the cap.
Docker hardening, SSRF guards, tool validation, and role-scoped registries keep missions inside the charter.
Every tool call, artifact, and network request can be signed into a Merkle audit chain and Article 12 bundle.
Praetor's customer story is not magic. It is a visible chain of approvals, holds, tool calls, sandbox events, and settlement.
Praetor is strongest when the mission touches money, credentials, files, browsers, generated media, compliance records, or customer-facing artifacts.
Drive Chromium through DOM-first automation for scraping, admin panels, forms, and workflows that need a real browser.
Run repo-aware coding missions with scoped file tools, test commands, audit logs, and budget caps.
Route design, video, voice, 3D, SEO, and social tasks through one governed mission envelope.
Scrape, chunk, synthesize, and store source-backed research with SSRF guards and evidence output.
Expose governed agent actions behind hosted API keys and plan limits through the BizSuite portal.
Export a tamper-evident trail when customers ask what happened, what it cost, and which tool touched what.
Self-hosted developers can start with the CLI. Customers who want hosted keys can use the same portal path as MnemoPay and GridStamp.
npm install -g @kpanks/cli
PRAETOR_DEV_MODE=1 praetor serve
praetor run charters/demo-basic.yaml \
--article12 ./audit-bundle
curl https://praetor-api.fly.dev/api/v1/missions \
-H "Authorization: Bearer pt_live_..." \
-H "Content-Type: application/json" \
-d '{"goal":"audit this workflow"}'
The portal already issues Praetor API keys. The UI should make the path easy for builders, teams, and enterprise buyers.
Charters per month for builders proving the runtime.
Charters per month for teams running recurring agent work.
For regulated teams that need governance, evidence, and deployment control.
Praetor is for the moment after the demo, when someone asks who approved the action, what it cost, where it ran, and how you prove it.
No. Praetor is the runtime layer underneath agent work: charters, budgets, tools, sandboxing, and audit output.
Yes. The CLI and packages are published. Hosted API access is available through the portal path.
Praetor ships fiscal gating, audit logging, sandbox controls, and tool governance as defaults rather than add-ons.
Yes. Praetor includes native packages for design, UGC, world generation, games, SEO, scraping, voice, and browser work.
Install the CLI, run a demo charter, or request hosted API access through BizSuite. Praetor is built for work that needs a budget, a sandbox, and an audit trail.