Features

Everything you need to govern AI agents

Aberon is built around three pillars: visibility, control, and compliance. Every feature below is real, tested, and available in the free tier.

Pillar 1

See everything

“Finally I can see what's happening.” — Full trace tree across multi-agent pipelines. Real-time SSE. Waterfall timeline.

Scenario

Multi-agent pipeline visibility

Problem

Orchestrator calls Research Agent and Summarizer. Each works independently. Where's the bottleneck? How much does each step cost?

Solution

Aberon links all spans via parent_trace_id. One page shows the entire chain: orchestrator → research → summarizer, with cost, latency, and token count per span.

  • Waterfall timeline across agents
  • Click any span for full details
  • Bottleneck identification
Trace detail with waterfall timeline and span tree

Scenario

Live agent monitoring

Problem

At 3 AM one of 5 agents starts returning errors. By morning, 200+ tickets have no response.

Solution

Real-time SSE dashboard. Quick filters for errors, slow traces, expensive runs. Drill down to the exact span and error message. Problems visible in seconds, not hours.

  • Real-time SSE streaming
  • Quick filters: Errors, Slow, Expensive
  • Drill-down to exact error span
Traces list with quick filters showing 63 traces, 5 errors, live indicator

Scenario

5-minute integration

Problem

Your team already built an agent on LangChain. Adding observability means rewriting code, configuring Datadog, setting up dashboards…

Solution

3 lines of Python. No code changes to your agent. Cost, latency, errors visible in seconds.

Python
from aberon import Client
aberon = Client(base_url="http://aberon:8080")
with aberon.trace(agent_id=my_agent) as trace:
    result = agent.run("Analyze this document")
  • Works with LangChain, CrewAI, AutoGen, LlamaIndex, custom
  • Cost, latency, errors — visible immediately
  • Zero changes to your existing agent code

Pillar 2

Stop anything

“My agents can't do anything dangerous.” — PII masking, tool restrictions, cost limits, human approval.

Scenario

Block dangerous tool calls

Problem

Support agent has access to search_kb, create_ticket, send_email, execute_sql. The last two are dangerous — the agent could hallucinate and send an email or run SQL against production.

Solution

One policy: block execute_sql and send_email. Agent cannot call them. Every attempt is logged in audit trail. Setup takes 2 minutes, no code changes.

Policies list — Tool Restriction, Cost Limit, and PII policies with test panel

Scenario

Cost control with human approval

Problem

Data Analysis Agent processes large datasets through GPT-4. Normal request costs $0.50. But sometimes the agent enters a loop and racks up hundreds of dollars.

Solution

Cost limit policy: if trace exceeds $50, agent pauses and requires human approval. Analyst sees full context, approves or rejects. Every decision recorded in audit trail.

Approvals queue with blocked tool call and approved cost overage

Scenario

Automatic PII masking in traces

Problem

HR Agent works with salaries, SSNs, bank accounts. Compliance requires: PII must not be stored in logs or observability tools.

Solution

PII detection policy with Presidio. Automatically detects and masks PERSON, PHONE, CREDIT_CARD, SSN, IBAN in all traces. Raw data never reaches storage.

Before → After masking
"Employee John Smith (SSN: 123-45-6789) receives payment to DE89370400440532013000."
"Employee [PERSON] (SSN: [US_SSN]) receives payment to [IBAN_CODE]."
  • GDPR/HIPAA compliance out of the box
  • PII detected automatically (Presidio)
  • Raw data never stored

Pillar 3

Prove everything

“The auditor will love this.” — Immutable audit trail with hash chain. Tamper-evident. Regulator-ready.

Scenario

Immutable audit trail for regulators

Problem

A bank uses AI for credit decisions. The regulator asks: which decisions did AI make, who approved them, and prove the logs haven't been modified.

Solution

Every audit entry includes a SHA-256 hash of itself plus the previous entry's hash. Modify any record and all subsequent hashes break. One-click verification.

  • Hash chain — tamper-evident
  • Verify Integrity — one click
  • Export JSON for external audit
Audit log with events, hash chain, Verify Integrity and Export JSON buttons

Scenario

Multi-agent visibility with data isolation

Problem

An orchestrator coordinates 3 agents: Research, Writing, Review. The orchestrator sees full context (including PII), but child agents must not have access to each other's data.

Solution

Each agent gets its own capture_mode: orchestrator records everything, child agents record redacted or metadata-only. PII is masked at the agent level. The auditor sees data is protected without accessing the details.

Capture modes
Orchestrator capture_mode: full
  Research Agent capture_mode: redacted
  Writing Agent capture_mode: redacted
  Review Agent capture_mode: metadata_only
  • Full pipeline visibility with data isolation
  • PII stays in orchestrator — child agents see masks
  • Auditor verifies compliance without seeing raw data

Dashboard

Everything in one place

Agent count, total cost, error rate, policy blocks, pending approvals — one glance tells you the full picture.

aberon.internal
Aberon overview dashboard with agent stats, token usage, and cost breakdown

See your first trace in 5 minutes.

Download the free tier. No credit card, no sales call, no time limit. All features above are included.