GOVERNED AI · ON YOUR HARDWARE
Run AI
inside the perimeter.
A four-stage airlock keeps prompts inside your network. Reviewers approve every artifact. The audit log is yours.
How it works.
Every prompt your team writes passes through a layered airlock before any model sees it. Anything that looks like real PII is refused at the gateway. Anything that passes is policy-evaluated, routed to the right reviewer, and signed into an append-only audit log on your storage.
user prompt
│
▼
┌───────────┐ ┌───────────┐ ┌───────────┐ ┌───────────┐
│ STAGE 1 │ ─▶ │ STAGE 2 │ ─▶ │ STAGE 3 │ ─▶ │ STAGE 4 │
│ regex + │ │ schema │ │ policy │ │ rewrite │
│ recognizer│ │ shape │ │ (OPA) │ │ (opt-in) │
│ │ │ │ │ │ │ depth = 1 │
│ refuse │ │ refuse │ │ route │ │ │
└─────┬─────┘ └─────┬─────┘ └─────┬─────┘ └─────┬─────┘
│ │ │ │
└────────────────┴────────────────┴────────────────┘
│
▼
┌─────────────────────┐
│ inference target │
│ (your GPUs) │
└─────────┬───────────┘
│
▼
┌─────────────────────┐
│ review queue │
│ audit log → │
└─────────────────────┘
- 1 Deterministic match. Real PII patterns — SSN, credit card, secrets, internal hostnames — are refused before the model is called.
- 2 Strict shape. The envelope is enforced with
additionalProperties: false. Out-of-shape input is refused at the gateway. - 3 Policy decision. Per-class redaction, approval-queue routing, provenance-aware promotion. Rules are versioned, signed, and reviewable.
- 4 Constrained rewrite. Optional, depth-bounded, opt-in per request class. Never the default path.
What you can build.
Incident-to-runbook
Turn alert webhooks, build failures, and on-call notes into reviewed runbook entries in minutes. Sensitive identifiers redacted at the gateway. Senior engineer eyeballs only on the approval click.
Policy-aware copilot
A coding and ops copilot bound to your policy bundle. It can reach your code, your runbooks, your knowledge base — and nothing else. Every external call is policy-checked.
Knowledge promotion
Drafts become approved knowledge with a signed lineage. Reviewers tag, redact, and promote artifacts into the next training set without any data leaving your storage.
Air-gapped deploy
Disk-image install. No outbound network requirement. Update bundles by approved transfer media. The same airlock and audit log run regardless of connectivity.
See it run.
A sandboxed version of the airlock runs in your browser. Synthetic incidents only. Real PII is hard-rejected before any model call — you can verify that yourself.