50
Demo payouts per sample batch
Seeded CSV includes clean and flagged rows across multiple corridors.
Documentation hub
Move from first batch to production controls with endpoint maps, workflow ownership, and compliance evidence guidance in one place.
50
Demo payouts per sample batch
Seeded CSV includes clean and flagged rows across multiple corridors.
4
Policy outcomes
Pass, warn, require review, and deny are enforced at evaluation time.
5
Route candidates per payout
Scored on cost, speed, compliance, and risk before recommendation.
6
Default RBAC roles
Viewer through owner with maker-checker boundaries built in.
Different teams enter at different points. Pick the path that matches your immediate objective.
Create a batch, import payouts, run policy, approve, and export artifacts without custom setup.
Operators and product demos
Wire Anchrix into your internal operations tooling with org-scoped REST endpoints.
Backend and platform engineers
Plan event-driven downstream actions for approvals, artifacts, and compliance operations.
Integrations and platform ops
Author and evolve DSL-based rules with version snapshots attached to every evaluation.
Compliance and risk teams
Generate evidence packets and accounting files directly from approved payout batches.
Finance operations and auditors
Understand auth boundaries, role control, and policy/legal references before production.
Security, legal, and leadership
Map each operational stage to a concrete endpoint and output so teams can coordinate handoffs.
POST /v1/batchesDraft batch ID created with org scope and initial audit event.
POST /v1/batches/{id}/items:importCSV rows validated and attached to the batch with normalization metadata.
POST /v1/batches/{id}/evaluateRule outcomes, route decisions, and policy snapshot hash captured per item.
POST /v1/investigations/{itemId}/generateTiered AI narrative scaled to plan level, with evidence pointers and disposition notes for review-required rows.
POST /v1/batches/{id}/submit → POST /v1/batches/{id}/approveMaker-checker handoff with separation-of-duties checks and immutable audit trail.
POST /v1/batches/{id}/artifacts/audit-packetDownloadable HTML evidence packet and accounting CSV artifacts.
Core routes teams use most often in pilot and production workflows.
| Method | Path | Purpose | Minimum role |
|---|---|---|---|
| POST | /v1/batches | Create payout batch container | operator+ |
| POST | /v1/batches/{id}/items:import | Import and validate payout rows | operator+ |
| POST | /v1/batches/{id}/evaluate | Run policy engine and route scorer | operator+ |
| GET | /v1/payout-items/{id}/policy-results | Inspect row-level policy evidence | viewer+ |
| POST | /v1/investigations/{itemId}/generate | Generate investigation narrative stream | analyst+ |
| POST | /v1/batches/{id}/submit | Submit batch for checker approval | operator+ |
| POST | /v1/batches/{id}/approve | Approve batch with maker-checker controls | approver+ |
| GET | /v1/audit-events | Read immutable event timeline | viewer+ |
| POST | /v1/batches/{id}/artifacts/audit-packet | Create regulator-ready HTML packet | approver+ |
| POST | /v1/batches/{id}/artifacts/export | Generate accounting export CSV | approver+ |
Every mutation route should include a bearer token and X-Org-Id. Keep role ownership explicit for create, investigate, and approve paths.
Event-driven targets to prepare now, with a production-safe fallback path available today.
/v1/audit-events on a short interval for status-driven downstream actions.| Event | Trigger | Payload highlights | Status |
|---|---|---|---|
batch.created | New payout batch is initialized | batch_id, org_id, actor_id, created_at | Planned |
batch.evaluated | Policy + route evaluation completes | batch_id, evaluated_count, flagged_count, snapshot_hash | Planned |
investigation.dispositioned | Analyst sets disposition on a flagged item | item_id, disposition, actor_id, note_ref | Planned |
batch.submitted | Operator submits for maker-checker | batch_id, submitted_by, submitted_at | Planned |
batch.approved | Approver accepts the batch | batch_id, approved_by, approved_at, artifact_ids | Planned |
artifact.generated | Audit packet or export file finishes | artifact_id, artifact_type, batch_id, download_path | Planned |
Use these controls to keep payout speed high without sacrificing governance quality.
Required X-Org-Id request boundary
Middleware scope check and org-filtered queries
Role hierarchy from viewer through owner
Endpoint-level permission checks before mutation
Rule set snapshot with SHA-256 hash
Stored on evaluation and included in artifacts
Submitter cannot self-approve batch
Approval handler cross-checks prior submit event
Append-only database trigger on audit_events
Update/delete attempts blocked at DB layer
Artifacts linked to batch and approval history
HTML packet + CSV generated from system data
Yes. Most teams start with one corridor, validate policy and approvals, then add corridors once exception handling is stable.
No. Every critical lifecycle stage has API endpoints, and the docs hub maps each stage to concrete routes and role gates.
Use policy snapshots, immutable audit events, and generated audit packets as your baseline evidence package for reviewers.
Not yet in this build. Use scheduled polling of /v1/audit-events now, then shift to event delivery once webhook support is released.
The investigation engine adapts its analytical depth to your plan tier. Higher tiers access more capable models and multi-model consensus for cross-validated analysis.
Start with quickstart and API reference, then use policy and audit docs to harden controls before production traffic.