A paid pilot lets your team integrate Stage0 into a real agent workflow, verify runtime authorization behavior against your actual risk surface, and produce audit evidence before a broader rollout.
Share the agent workflow you want to gate: the tools it calls, the side effects it produces, and the risk signals that matter most. We map this to a Stage0 policy shape.
Your team integrates `/check` into the target workflow. We provide integration support, example payloads, and policy template starting points matched to your use case.
Stage0 processes live decisions against your workflow. You carry `request_id` and `policy_version` into your own logs. Blocked and deferred runs produce audit records your team can inspect.
At the end of the pilot period, we review the decision record together: what was blocked, deferred, and allowed, and whether the policy shape matched your actual risk surface.
Every `/check` call during the pilot produces a structured record with decision, verdict, issues, and risk signals. You keep these in your own logs.
You confirm whether the policy configuration produces the enforcement behavior your runtime actually needs before going broader.
The pilot period produces traceable evidence of runtime authorization decisions that can feed into your own security review, procurement review, or incident response posture.
Priority email support, example payload review, and policy template recommendations aligned to your use case throughout the pilot window.
Share your runtime shape, the tools your agent calls, and the side effects you want to gate. We will confirm fit and set up the pilot scope.
If the pilot confirms Stage0 is the right fit, you stay on the plan that matches your production volume. No renegotiation required — the same public pricing applies. If you need higher quotas or custom terms, we discuss that at the end of the pilot based on what you actually observed.