Documentation Index
Fetch the complete documentation index at: https://docs.acmeagentsupply.com/llms.txt
Use this file to discover all available pages before exploring further.
SphinxGate
SphinxGate applies policy guardrails to your model routing. As agent systems grow — multiple models, fallback chains, different providers for different tasks — routing becomes a reliability surface in its own right. SphinxGate makes it controllable, inspectable, and provable.The Problem SphinxGate Solves
Multi-model agent systems have a routing problem that almost no one addresses until something goes wrong:- Which models are actually being called? Not which ones you think — which ones are actually used in production.
- Why did the fallback fire? Was it expected or a silent failure?
- Who approved this routing change? Can you prove compliance?
- Can you trust the audit trail? If your routing logs are incomplete, you can’t answer incidents or audits.
What SphinxGate Does
Policy Enforcement
Allow/deny rules for which models and providers can be used — and under what conditions.
Routing Audit Trail
Every routing decision logged with the model chosen, the reason, and the policy applied.
Fail Behavior Control
Configure fail-open vs. hard-fail behavior per route. No silent surprises.
Anomaly Detection
Flags unexpected routing patterns — unauthorized models, unusual fallback frequency, policy violations.
How Routing Policy Works
SphinxGate operates as a policy layer between your agent and the model router:Policy Model
SphinxGate policies are simple allow/deny rules with conditions:Fail Behaviors
| Behavior | Meaning | When to Use |
|---|---|---|
hard_fail | Request fails with error | Compliance, security-sensitive routes |
fail_open | Falls through to next policy/fallback | Resilience-first configurations |
log_deny | Deny logged, request proceeds | Audit-without-blocking mode |
log_alert | Permitted but flagged | Monitor unexpected-but-acceptable routes |
Routing Log Format
Every decision is logged:Anomaly Detection
SphinxGate flags routing patterns that don’t match expectations:| Anomaly | Trigger |
|---|---|
| Unauthorized model | A model outside the allow list was requested |
| Fallback frequency spike | Fallbacks firing much more than baseline |
| Policy violation attempt | Explicit deny rule triggered |
| Unknown provider | Request routed to unrecognized provider endpoint |
| Config bypass attempt | Routing attempted outside SphinxGate |
Quick Start
CLI Reference
SphinxGate vs Agent-Level Config
You might already configure model fallbacks in your agent’s gateway config. SphinxGate is not a replacement for that — it’s a policy and audit layer on top of it.| Layer | What It Does |
|---|---|
| Gateway config | Defines fallback chains and preferred models |
| SphinxGate | Enforces policy on top of those choices; logs every decision |
Who SphinxGate Is For
SphinxGate is most valuable for teams that:- Use multiple models or providers and need to know which ones fire
- Have compliance requirements around AI model usage
- Run production-grade agent systems where unauthorized routing is a risk
- Want audit-ready logging without building it themselves
Pricing
SphinxGate is a paid product. See Pricing for current rates.Next Steps
Transmission
Signal transport integrity for the broader reliability stack.
Agent911
SphinxGate anomalies feed into the Agent911 unified snapshot.
Sentinel
Runtime protection to complement routing governance.
RadCheck
Point-in-time reliability scan. Good first step.