Security and recovery for agentic work

Give AI speed an authority boundary before it hits production.

Sentinel turns AI-touched code, runtime, and security risk into an evidence-bound recovery decision: what happened, what it touches, what can act, what must be verified, and what autonomy level is allowed.

Atlas graph39,420 nodes

Context comes from the current code/runtime/doctrine substrate.

Sentinel findings267

Open findings are routed through evidence and authority boundaries.

High severity87

Material risk does not hide behind agent speed.

Autonomy todayLevel 2

Propose repair with verification; production mutation remains owner-gated.

Evidence surfacesubstrate-bound
Sentinel receipt showing substrate binding enforcement
Cognition had to bind to substrate. The public claim is not "AI says it is safe." The claim is evidence, authority, verification, and recovery path.

The lowest-friction buyer already uses agents in real work.

This funnel is for teams where coding agents, automation agents, or AI-assisted delivery already touch code, reviews, deployments, workflows, or client commitments. The pain is not curiosity. It is review trust.

Technical founder / CTO

"We moved faster, but review confidence fell."

Best first buyer when they can name one AI-heavy workflow that now creates release anxiety.

Security / platform lead

"I need blast radius and authority, not another alert row."

Best first buyer when agent changes touch auth, deploy scripts, dependencies, infra, or customer data.

AI agency / services firm

"Client approval slows down because proof is weak."

Best first channel when AI-assisted delivery needs evidence packets before clients trust the work.

Claim boundary: Sentinel currently supports deterministic repo/runtime/security-relevant scans, compound app risk, risk graphs, recovery plans, verification predicates, and task/Hive routing. The broader proactive cybersecurity layer is being added through safe deterministic probes for exposure, auth/session, shell boundaries, secrets, dependencies, SBOM, Kubernetes, and public surface inventory.

Sell the first painful proof, not the whole operating system.

Primary offer

Agentic Work Risk & Recovery Sprint

One AI-touched workflow. One failure mode. One evidence boundary. Sentinel maps the affected system with Atlas, classifies the risk, generates a bounded recovery contract, and routes only the actions your autonomy policy allows.

  • Output 1: Atlas context and affected-surface map.
  • Output 2: Sentinel risk/recovery packet with authority boundary.
  • Output 3: Verification predicate and owner-approved next action.
  • Output 4: Go/no-go decision for a design-partner loop.
Commercial path

Move only when the receipt changes a decision.

Start with a scoping call. If the workflow is real and bounded, run a 1-week sprint. If the output changes release, review, security, or client approval behavior, expand to a 30-day design-partner loop.

  • Scoping call: 25 minutes, no secrets, narrow fit test.
  • Proof sprint: fixed-scope review for one workflow.
  • Design partner: 2-3 workflows, weekly recovery review, measured decision impact.

Use proof as evidence, not as the product.

Screenshots support narrow claims: gate enforcement, substrate binding, and action-ledger accountability. They prove the operating loop; they are not the thing being sold.

Receipt screenshot showing a pre-tool gate blocking unsafe action
Harness enforcement

Unsafe action was stopped before the command.

Use with buyers worried that agent speed bypasses engineering judgment.

Receipt screenshot showing an overclaim narrowed by evidence
Claim discipline

Overclaim narrowed to evidence.

Use with security and compliance buyers who need bounded language before trust.

Receipt screenshot showing action ledger receipts
Accountability

The action ledger preserves the next decision.

Use with operators who need follow-up ownership after the session ends.

Bring the workflow you would show a skeptical reviewer.

A strong submission names the agent tools, the risk surface, the autonomy comfort level, and the business decision that becomes easier if Sentinel produces a trustworthy recovery packet.

The first sprint is intentionally narrow.

Do not submit a whole company transformation. Submit one workflow, one failure mode, and the boundary we are allowed to inspect.

Open build receipt

What a qualified sprint produces.

01 / Scope

Constrain the workflow.

One repo path, automation path, release decision, client handoff, or internal agent loop.

02 / Map

Bind it to Atlas.

Connect code, runtime, doctrine, decisions, evidence, and owner impact where available.

03 / Classify

Generate recovery contract.

Risk, blast radius, authority boundary, autonomy ceiling, and verification predicate.

04 / Decide

Move, hold, or disqualify.

If the packet changes a real business or release decision, expand. If it does not, stop.