How it works
What you get under the hood
Four systems that turn a single GPU (or a room full of laptops) into a private AI stack your team controls end-to-end. No cloud, no per-token billing, no data leaving your building.
RigRun
Unlimited inference on your hardwareA frontier-class model running in your server room, priced like electricity instead of tokens. One GPU, one binary, unlimited queries. Your sensitive code and documents never leave your network.
RigRun ships with everything your team needs on day one: a safety stack that blocks adversarial prompts, a fast-and-slow dual-model cascade that keeps latency down, and an overnight self-improvement loop so the model gets better on your workload without ever going offline.
Specs
Pyros
A safety perimeter for any LLMA 17,000-line pure-Go engine that wraps any large language model in a 7-pillar safety pipeline. Most LLM safety stacks are Python wrappers around a moderation API call. Pyros is a separate process that implements the actual algorithms from the literature — SmoothLLM, isotonic calibration, EvoPrompt, negative-selection AIS, PID homeostasis — instead of forwarding the question to a hosted classifier.
Pyros doesn't require RigRun. Drop it in front of OpenAI, Anthropic, vLLM, llama.cpp, Ollama, or anything else that speaks the OpenAI-compatible chat completions format.
The 7 Pillars
Device Tiers
Mycelium
Scale out without a data centerTurn any collection of devices — phones, laptops, vehicles, servers — into a single AI cluster that heals itself. Need more capacity? Plug in another node. Lose a node in the field? The mesh routes around it. Works offline, survives network partitions, and has no single point of failure to defend.
Mycelium runs over the network you already have. No InfiniBand. No specialized hardware. No data center buildout.
Agent Factory
Custom AI agents in days, not monthsTell us what you need your AI to do, in plain English. You get back a tested agent — with the right tools, the right knowledge base, the right guardrails, and an evaluation rubric your team can audit. Every agent goes through adversarial stress tests and a human approval gate before it ever touches your users.
The result: a bespoke AI specialist tuned to your workflow, delivered in days instead of months of prompt engineering. And every agent keeps getting better from real usage.
steps
registry
probes
Compliance
Security & Compliance
Controls implemented in source. No formal security assessment, third-party audit, or accreditation has been completed. CAC/PKI is implemented but not yet validated for deployment.
Implemented Controls
NIST 800-53 Rev 5
Certification Roadmap
Thornveil is transparent about what is implemented and what is in progress. No certification is claimed until formally granted.