SENTINEL.
On-device security posture, privacy enforcement, and cyber defence under hardware-bound keys.
SENTINEL is the security specialist of the Mickai cooperative. It monitors the operator's surface area, enforces privacy boundaries across tenants (patent 04), inspects every inbound artefact for prompt injection and exfiltration patterns, and gates sensitive actions behind voice-biometric re-authentication (patent 13). Its threat model assumes the cloud is hostile and the network is observed; everything SENTINEL evaluates is verified against signed local policy, not against vendor reputation.
- 01Tenant boundary enforcement under cryptographic isolation
- 02Prompt-injection and exfiltration inspection at ingress
- 03Voice-gated re-authentication for sensitive operations
- 04Signed posture reports for compliance officers
Authoritative external corpora and standards this brain treats as canonical. Every retrieval against these sources is signed into the audit ledger so a regulator can prove which evidence drove which output.
- 01NIST SP 800-series cybersecurity standards
- 02MITRE ATT&CK framework
- 03CVE database
- 04OWASP Top 10
- 05NCSC UK guidance corpus
- 06ENISA threat landscape reports
- 07ISO/IEC 27001 and 27002
- 08FIPS 140-3 cryptographic module validation
- 09FIPS 204 ML-DSA post-quantum signatures
- 10CIS Critical Security Controls
Mickai-native tooling primitives this brain implements internally. Codex for sovereign plain-text graph PKM, Lectern for spaced-repetition memory, Stele for citation-provenance, and domain-native primitives layered on top. No external services in the trust path; data stays on operator-personalised hardware.
- 01Codex (sovereign plain-text graph PKM)
- 02Cipher (encrypted local credential store)
- 03Aegis (policy enforcement engine)
- 04Watchtower (threat-intelligence aggregator)
- 05Wax-Seal (signing and transparency log)
- 06Threshold (identity provider)