Sentinel is a defense-in-depth AI security platform. Each layer uses a fundamentally different detection paradigm, so a bypass for one layer doesn’t help against the next.
User / LLM Application
│
▼
┌──────────────────────────────────────────────────────────────┐
│ SHIELD (C11) │
│ AI Security DMZ — 36K+ LOC, 21 protocols │
│ Rate limiting · Protocol validation · DDoS defense │
└──────────────────────────────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────────┐
│ SENTINEL-CORE (Rust) │
│ 61 Detection Engines · <1ms latency │
│ │
│ ┌─────────────┐ ┌─────────────┐ ┌─────────────┐ │
│ │ L1: Core │ │ L1: Gaps │ │ L1: Output │ │
│ │ Injection │ │ Memory Int. │ │ Meta-Frame │ │
│ │ Jailbreak │ │ Tool Shadow │ │ Tool-Call │ │
│ │ PII, Exfil │ │ Cognitive │ │ Crescendo │ │
│ │ Moderation │ │ Dormant │ │ │ │
│ │ Evasion │ │ Code Sec. │ │ │ │
│ └─────────────┘ └─────────────┘ └─────────────┘ │
│ │
│ ┌───────────────────────────────────────────────────────┐ │
│ │ SENTINEL LATTICE — 7 Novel Primitives │ │
│ │ │ │
│ │ TSA Temporal Safety Automata (LTL → O(1) monitors) │ │
│ │ CAFL Capability-Attenuating Flow Labels │ │
│ │ GPS Goal Predictability Score │ │
│ │ AAS Adversarial Argumentation Safety (Dung 1995) │ │
│ │ IRM Intent Revelation Mechanisms │ │
│ │ MIRE Model-Irrelevance Containment │ │
│ │ PASR Provenance-Annotated Semantic Reduction │ │
│ │ L2 Capability Proxy + IFC (Bell-LaPadula) │ │
│ └───────────────────────────────────────────────────────┘ │
│ │
│ ┌─────────────┐ ┌─────────────┐ ┌─────────────┐ │
│ │ Domain │ │ Math │ │ Structured │ │
│ │ Behavioral │ │ Hyperbolic │ │ Agentic │ │
│ │ Compliance │ │ Spectral │ │ RAG │ │
│ │ Privacy │ │ TDA, Chaos │ │ Sheaf │ │
│ │ + 13 more │ │ Info Geom. │ │ │ │
│ └─────────────┘ └─────────────┘ └─────────────┘ │
└──────────────────────────────────────────────────────────────┘
│
┌──────────┼──────────┐
▼ ▼ ▼
┌──────────┐ ┌────────┐ ┌────────┐
│ BRAIN │ │ IMMUNE │ │ STRIKE │
│ (Python) │ │ (C) │ │(Python)│
│ 32 mods │ │EDR/XDR │ │ 39K+ │
│ gRPC API │ │ eBPF │ │payloads│
└──────────┘ └────────┘ └────────┘
250,000 attacks enter the system
│
├── L1 Sentinel Core (53 regex engines) ─── catches 36.0%
│ Remaining: 160,090
│
├── L2 Capability Proxy (IFC) ───────────── catches 20.3%
│ Remaining: 109,241
│
├── L3 Behavioral EDR ───────────────────── catches 10.9%
│ Remaining: 82,090
│
├── PASR Provenance tracking ────────────── catches 2.0%
├── TCSA Temporal + capabilities ────────── catches 0.8%
├── ASRA Ambiguity resolution ───────────── catches 1.3%
├── Combinatorial layers ─────────────────── catches 6.1%
├── MIRE Model containment ──────────────── contains 0.7%
│
RESIDUAL: ~1.5% (theoretical floor)
1. Input arrives at Shield (C11 DMZ)
2. Shield validates protocol, rate limits, forwards to Brain
3. Brain calls sentinel-core (Rust via PyO3) for detection
4. sentinel-core runs all 61 engines in <1ms
5. Results aggregated: detected/risk_score/matches/categories
6. Brain applies policy: allow / block / flag for review
7. Audit trail recorded