Security is architecture, not a slide. This page describes the trust posture of both Rethunk.AI products and the engagement-based delivery model.
Rethunk.AI builds two governance products - Bastion and Citadel - for regulated industries where accountability requirements extend beyond what a shared-infrastructure service can satisfy. Bastion governs the run-time operation of AI agents; Citadel is the AI-native git forge and knowledge substrate where those agents operate. The trust posture described here covers both products and the engagement-based delivery model through which they are deployed. This page is a high-level summary; it is not a substitute for your own risk assessment or contract terms.
IRONLAW is a versioned, signed doctrine bundle consumed by Bastion via the IRONLAW loader (REV 13). It defines seven autonomy rules that every Bastion-governed agent must satisfy: Intentional Human Impact, Rightful Authority, Operational Consent, Non-Improvisation, Least Authority, Accountability, and Within RoE. These rules are machine-readable policy artifacts evaluated at the Bastion policy gate - not a hosted compliance service you outsource enforcement to, and not a claim of automated legal omniscience. Extending evaluation depth to additional action classes is engineering work tracked with partners. IRONLAW does not replace your legal team or your chain of command.
The IRONLAW doctrine repo is Apache-2.0 licensed and published separately from the Bastion runtime gate, which is proprietary. The doctrine version in effect at any wall-clock moment is visible in the Bastion audit log and IRONLAW overview.
/readiness so auditors can confirm which doctrine bundle is in effect without a running server connection.prevHash linking to the prior line. Optional Merkle checkpoints enable incremental verification of ledger segments without replaying the full file. An offline CLI can verify and rebuild the audit sidecar against the primary ledger without a running server.Bastion and Citadel are designed for regulated-industry environments: healthcare, financial services, defense, and critical infrastructure. Both products support sovereign and air-gap deployment patterns as explicit design requirements, not afterthoughts. Citadel ships air-gap install, bundle, and attestation scripts; Bastion's IRONLAW loader operates fail-closed and does not require a cloud connection. Neither product offers anonymous trials or shadow data exposure paths. Evidence materials are shared under engagement with the organizations deploying the software - not published as public repository dumps.
The controls described above are verifiable by your compliance, risk, and engineering teams under a formal engagement. That engagement is the point at which cryptographic evidence materials, doctrine bundles, runbooks, and deployment attestation documents are shared. To begin the evaluation process, use the link below. For security disclosures, email [email protected] with subject line "Security disclosure" and we will route to the correct team.
Start a trust evaluation
We work with compliance, risk, and engineering teams in regulated environments. Evaluation begins with a scoped engagement.
Was this page helpful?