Honest answers about deployment, data flows, agent misbehavior, and
framework coverage — without the vendor-pitch handwaving.
Where does fastpace send my code? +
Nowhere. fastpace runs entirely on the developer's machine. Skills, agents, hooks, and the UI all execute locally; the audit log, ADRs, and context files are committed to your repo. The only external request fastpace mediates is the developer's existing AI runtime call (Claude / Codex / Gemini) — and that mediation is what the prompt-redaction layer and run-manifest signing exist for.
How do you prove the code-stays-local claim? +
Two ways. Run-manifest signing: every AI call writes a signed JSON manifest (model, endpoint, training-opt-out flag, prompt hash, response hash) under fastpace/manifests/. The signing key is generated per-install on first init. The hash-chained audit log: each entry signs the previous one, so any after-the-fact modification breaks the chain. fastpace verify walks the chain and reports tamper status.
What happens when an autonomous agent misbehaves? +
Three layers. (1) Identity & scope: every agent declares allowed tools, allowed paths, max files modified, max tokens — violations log and block. (2) Blast-radius limits: hard caps per session; exceeding requires human approval with a logged reason. (3) Circuit breaker: per-agent behavioral baseline; sessions that diverge from baseline auto-pause for human review. The audit-log entry shows the divergence detected and the operator who approved or killed the session.
How does fastpace prevent EchoLeak-class attacks? +
EchoLeak (the 2025 zero-click prompt-injection exfiltration in Microsoft 365 Copilot) succeeded because all three legs of the lethal trifecta were present: the agent had access to private data, was exposed to untrusted content, and had an external exfil channel through markdown links and open redirects on trusted domains. fastpace breaks each leg independently with deterministic Layer 1 controls — pre-prompt redaction (leg 1), declared scope + injection scanner (leg 2), runtime allowlist + MCP scope + hash-chained audit (leg 3). Even if any one leg slips, the others hold. See the lethal-trifecta section above for the per-leg detail.
How do we discover fastpace installs across the org? +
fastpace writes a discovery manifest at two well-known paths: ~/.fastpace/manifest.json (machine-wide) and <repo>/fastpace/manifest.json (per repo). Both declare install ID, version, agents loaded, runtimes configured, hooks enabled, and last-activity timestamp. Any enterprise discovery / NHI governance tool that scans known paths (CrowdStrike, Beyond Identity, Wiz, Astrix, Oasis) will find fastpace announcing itself rather than hiding.
Which frameworks does fastpace map to? +
Three AI-specific frameworks: NIST AI RMF (Govern / Map / Measure / Manage), ISO/IEC 42001 (AI management systems), and the EU AI Act (Articles 9–17). Plus the traditional infosec frameworks: SOC 2, ISO 27001, HIPAA, SOX, GDPR, PCI-DSS. Specific control mappings live in the matrix below — and we recommend confirming exact wording with your auditor before publishing claims.
How does prompt redaction work? +
A pre-prompt hook (hooks/prompt-redactor.js) runs the same regex set as the secret scanner, plus a configurable PII keyword list and any sensitivity-tagged content from fastpace/context/. Redactions are logged as discrete events in audit.log. The redactor is on by default; the regex set and keyword list are versioned in fastpace.config.yaml so changes are reviewable.
Can we restrict which AI runtimes developers use? +
Yes. fastpace.config.yaml accepts runtimes.allowed (e.g., bedrock-claude-opus-4.7, vertex-gemini-1.5). A pre-call hook blocks invocations to runtimes not on the allowlist. Combined with run-manifest signing, this lets the org enforce "Claude on Bedrock with training disabled — yes; raw Anthropic API — no" and prove it after the fact.
What does the org-level rollout look like? +
Per-repo, fastpace runs locally and emits signed audit summaries. The optional self-hosted org dashboard ingests those summaries — no code, no prompts, no responses — and rolls them up: ADR coverage %, correction rate, framework readiness per repo, evidence-snapshot freshness. SSO/SCIM/RBAC sit on the org dashboard. Air-gapped install paths are available for federal civilian / defense / regulated finance.
What is on the roadmap that I should know about now? +
The agent-governance core (identity manifests, scope enforcement, circuit breaker), the prompt-redaction layer, the hash-chained audit log, and the discovery manifest are all on the immediate near-term roadmap. The differentiators (correction-event tracking, AI-BOM generation, provenance-signed commits, continuous red-team harness) follow. Ask for a copy of the current roadmap under NDA.