-
Notifications
You must be signed in to change notification settings - Fork 270
"Compliance by Design" — Git workflows as financial controls #40
Description
Problem
Teams evaluating AI agents in regulated industries (fintech, banking, insurance)
typically assume they need to bolt on compliance controls after building the agent.
This creates friction at adoption — security reviews, audit evidence requirements,
and segregation-of-duties policies all feel like blockers.
Observation
While exploring GitAgent after the launch, I noticed something that I don't think
is obvious from the developer tooling angle:
Financial controls and git workflows are structurally identical:
| Finance Control | GitAgent Equivalent |
|---|---|
| Maker-checker approval | Pull Request merge |
| Segregation of Duties (SOD) | Branch protection rules |
| Immutable audit trail | git log |
| Control documentation | RULES.md |
| Point-in-time snapshot | git tag |
These are isomorphisms. A GitAgent-standard agent operating
inside a git repo doesn't need to be "made compliant" ; it already is, by how git works.
Compliance isn't layered on. It's a property of the architecture.
Proof of Concept
I built a working demo applying this to the CFO office , specifically the monthly
financial close (bank reconciliation, AP sub-ledger, variance commentary):
→ https://github.com/Priyanshu-Priyam/gitclose
Three agents (Atlas, Nova, Echo) close the books for a fictional engineering firm.
Every agent action is a git commit. Every approval is a merged PR. The audit trail
is git log. No separate compliance layer. No documentation overhead.
Proposed Addition
Would it be worth adding a section to the GitAgent docs or README on regulated
industry use cases? The core argument being: if your domain has maker-checker
controls, audit requirements, and recurring exceptions, GitAgent is already
structurally compatible ; you don't need to retrofit compliance on top.
Happy to contribute a write-up or worked example if that's useful.