Platform Platform OverviewArchitecture
Jurisdictions Thermal InspectionPrecision MappingFire MonitoringISR Operations
Papers Partner with us

Two runtimes.
One governed
wire.

State, not prompts, must be the authority.

A Rust proxy intercepts every MAVLink frame at wire speed before it reaches the autopilot. A Swift rule engine evaluates it against declared governance laws and issues a typed verdict. Neither the AI module nor the autopilot know Sentinel exists.

0
Latency impact
100%
Frames evaluated
Identical replays
Sentinel Core · Runtime Stack
Frame in transit · evaluation in progress
Wire active
AI module
Proposal
SET_POSITION_TARGET
alt=840ft
Rust proxy
MAVLink intercept
Frame deserialize
→ Swift kernel
Swift kernel
Rule evaluation
R-03
AUTO_ALLOW
Hash entry
Autopilot
Allowed frame received
·
Governance transparent
Current frame #4,112 AUTO_ALLOW within bounds chain: a3f9c...
The Thesis

AI proposes.
Laws decide.

The AgentVector pattern separates stochastic intelligence from deterministic governance. AI agents observe state and generate proposals as typed Actions. Laws evaluate deterministically. Principals authorize at risk thresholds. Reducers transition state as pure functions. The audit trail records everything.

AgentVector Governance Pipeline
AGENT STOCHASTIC OBSERVES STATE PROPOSES ONLY ACTION TYPED ENUM CODABLE · SENDABLE LAW EVALUATION DETERMINISTIC FLIGHTLAW 0-7 + JURISDICTION LAWS LAW 8 AUTHORITY GATE REDUCER PURE FUNCTION NO SIDE EFFECTS OUTPUT NEW STATE SHA256 VERIFIED AUDIT TRAIL APPEND-ONLY HASH CHAIN TAMPER-EVIDENT DETERMINISTIC REPLAY INTELLIGENCE PROPOSAL EVALUATION TRANSITION VERIFICATION EVIDENCE
01
Agents propose only

Agents observe state (read-only) and generate proposals as typed Actions. They never mutate state directly and never bypass the reducer.

02
Laws evaluate deterministically

Laws are constitutional constraints. They validate preconditions, enforce invariants, and gate authorization. FlightLaw violations always take precedence.

03
Reducers authorize atomically

Reducers are pure functions. Same inputs always produce same outputs. No side effects, no I/O, no randomness. Invalid actions return unchanged state.

04
Audit trail is the product

Every dispatched action is recorded. State hashes computed before and after. Source attribution included. Replay produces identical results.

Product Goals

Architecture serves
product outcomes.

Every architectural decision traces to one of three product outcomes. The architecture is not the product — it is the mechanism that makes the product trustworthy.

01
Operator Confidence

The operator must trust the system enough to authorize missions without micromanaging. Deterministic law evaluation, transparent decision surfacing, and replayable audit trails build this trust architecturally.

02
Regulatory Readiness

Every decision must be provable to a regulator, insurer, or commander after the fact. Hash-chained audit trails, tamper-evident logging, and deterministic replay provide the evidence chain that compliance demands.

03
Extensibility Without Risk

New jurisdictions must inherit safety guarantees without reimplementing them. FlightLaw provides the universal safety kernel. Jurisdictions compose domain laws on top. The canvas plugin pattern keeps the interface extensible without exposing governance internals.

FlightLaw

Nine laws.
One kernel.

Every jurisdiction inherits FlightLaw. These nine laws (0–8) are evaluated before every state transition. FlightLaw violations always take precedence over jurisdiction-specific laws.

The AgentVector Codex defines the full Law registry (0–10). FlightLaw composes Laws 0–8 as its constitutional foundation. Jurisdiction-specific laws (EvidenceLaw, GridLaw, EMCONLaw, etc.) extend the kernel for each domain.

0
Containment

System boundary enforcement. Defines the operational envelope. EMCON boundary in ISR jurisdictions.

1
Identity

Principal authentication. Verifies the authorized human decision-maker before any mission state transition.

2
Weather

Environmental pre-flight gate. WeatherKit evaluation against operational thresholds. No override without principal authorization.

3
Observation

Telemetry quality, GPS lock, IMU calibration. The system must observe itself accurately before it can act.

4
Resource

Battery, compute, and link budget enforcement. Operations cannot exceed available resources. RTH reserve enforced.

5
Classification

Data classification at the state level. Active in ISRLaw jurisdictions. Determines handling, storage, and transmission constraints.

6
Degraded Mode

Authority contracts when comms degrade. Autonomy envelope contracts — never expands. Deterministic fallback chain.

7
Spatial

Geofence, altitude ceiling, and no-fly zone enforcement. Corridor locked at mission authorization. Violations trigger immediate response.

8
Authority

Risk-tiered principal approval gate. The final law. Every state transition passes through Authority before the reducer executes.

Guarantees

Pure functions.
Proven by construction.

These are not aspirational design goals. They are architectural constraints enforced at compile time and verified by determinism tests. Violations are build failures.

Deterministic Reducers

Same in,
same out

Same inputs always produce same outputs. No side effects, no I/O, no randomness inside reducers. No Date(), no UUID(), no .random(). Dependencies injected through protocols.

Immutable State

Structs, not
classes

State types are value types. All properties are let, not var. Updates create new instances via .with() methods. State conforms to Equatable, Codable, Sendable.

Typed Actions

Enums, not
strings

All state changes go through typed actions. Actions are enums with associated values. Actions conform to Equatable, Codable, Sendable. No stringly-typed systems.

Evidence

Append-only.
Hash-chained.
Tamper-evident.

Every state transition is recorded in an append-only log. Each entry contains a SHA256 hash that chains to the next entry. Breaking the chain is detectable. The audit trail is the product.

Audit Hash Chain · SHA256
ENTRY 1 SYSTEM Mission initialized 9c1b5ea7... prev: 0000000... HASH: a4f2c71b... ENTRY 2 PRINCIPAL Flight plan authorized f4a2c71b... prev: a4f2c71b... HASH: 7b3d9e4a... ENTRY 3 LAW Law 2 weather pass e8c4f192... prev: 7b3d9e4a... HASH: 2d6a8f3c... ENTRY 4 EVIDENCE Finding INSP-031 b5e71ca3... prev: 2d6a8f3c... HASH: 4c9b2e7f... ENTRY 5 PRINCIPAL Finding approved 1a8e3d9f... prev: 4c9b2e7f... HASH: 8f2c6b1a... PRINCIPAL LAW EVIDENCE SYSTEM
Law 8 Risk Tiers
Low
Auto-approved

Routine state transitions within established operational parameters. No principal interaction required.

Medium
Approval with timeout

Elevated risk transitions. Principal notified. Approval window with configurable timeout. Default action on expiry.

High
Explicit approval, no timeout

Critical transitions. Principal must explicitly authorize. No timeout, no default. The system waits.

Geospatial Layer

GeoVector.
Spatial governance,
open source.

GeoVector is the open source Apple-native geospatial application layer that sits between the SwiftVector governance kernel and FlightLaw. It provides the spatial primitives, OGC standards integration, Core ML imagery pipeline, and GeoPackage mission packaging that any governed spatial application needs.

The Open Contribution

GeoVector is the layer developers and evaluators can adopt for any governed spatial application. Flightworks Control is its reference implementation.

Key Capabilities
OGC Spatial Query

OGC-compliant spatial query engine — geofences, corridors, restricted zones.

Core ML Imagery

Core ML imagery pipeline with deterministic classification boundaries.

GeoPackage Missions

GeoPackage mission packaging for offline-capable edge deployment.

Apple Silicon Native

Local-first, Apple Silicon-native — no cloud dependency for spatial evaluation.

Open Source Boundary
Layer License
AgentVector CodexOpen specification
SwiftVector KernelMIT open source
GeoVector LayerMIT open source
FlightLawProprietary
Mission ModulesProprietary
Watch StationProprietary
SentinelProprietary
GeoVector on GitHub →
Two Kernels

SwiftVector +
RustVector.

The same constitutional architecture implemented in two languages. SwiftVector powers the principal interface. RustVector powers the edge relay. Both produce identical audit trails from identical action sequences.

SwiftVector Apple Platforms

Principal
Interface

Language Swift + SwiftUI
Application Watch Station
Mapping MapKit + GeoPackage
Weather WeatherKit (Law 2)
ML Inference Core ML on Apple Silicon
Platforms Mac + iPad + iPhone
RustVector Edge Infrastructure

Sentinel
Edge Relay

Language Rust
Application Sentinel MAVLink relay
Protocol MAVLink v2 (UDP)
Runtime tokio async
Parsing Zero-copy, wire-speed
Safety No unsafe. No unwrap.
Cross-Language Determinism

Both kernels implement the same reducer contract: reduce(state, action) → state. The audit trail format is identical. An action sequence replayed through SwiftVector and RustVector must produce the same final state hash. This is verified by cross-language determinism tests.

Learn More

Read the papers.
Evaluate the code.

The AgentVector framework, FlightLaw specification, and Sentinel architecture are documented in detail. Technical evaluation starts with the papers and the code.