K
Kumty

Platform Architecture

Intelligence, not just features.

Every feature in Kumty is connected through one coherent intelligence system. It’s not twenty features bolted together — it’s one engine.

The Intelligence System

Six stages. One engine.

Data flows through six stages. Each stage feeds the next. The loop runs continuously. No stage is optional.

  1. Data Layer
    87 tables · RLS
    1
  2. Feed Engine
    signal scoring
    2
  3. AI Pipeline
    orchestrator → DAL → LLM
    3
  4. Twin Engine
    5-dim state
    4
  5. Action Layer
    L0–L4 autonomy
    5
  6. Learning Loop
    outcomes → patterns
    6

Data Abstraction Layer

Your data never leaves your walls.

Most AI tools send your project data to external AI models. Kumty’s Data Abstraction Layer ensures zero project data reaches any external API. This isn’t a feature. It’s an architectural guarantee.

YOUR PERIMETERYour Data(real names, budgets)DALAnonymize9 categoriesEphemeral map60s TTLAbstraction▒▒▒ tokensExternal LLMAnthropic / OpenAIResponse rehydrated via mapping

How it works

  1. 1

    Analyze locally

    Your data is collected and reasoned about inside your own perimeter. Nothing leaves yet.

  2. 2

    Abstract the prompt

    Only an anonymized, structurally faithful prompt is constructed. Nine PII categories are redacted: names, emails, budgets, dates, vendors, organizations, locations, phones, and identifiers.

  3. 3

    Send the abstraction

    The abstracted prompt — never the real data — is what travels to the LLM. Mappings stay in an ephemeral store with a 60-second TTL.

  4. 4

    Map the response back

    The model's answer is rehydrated against the ephemeral mapping, then the mapping is destroyed. The model never saw a real name, and the system never retains the bridge.

Defense in Depth

The 13-Layer Zero Trust Chain

Every request to the platform passes through thirteen independent security layers. No single failure exposes data. To breach the chain, an attacker would have to defeat all thirteen — at the same time.

01

Network isolation

No service talks to another without a verified identity.

Every internal request between platform services is mutually authenticated and encrypted. A compromised pod can't impersonate another. Lateral movement is blocked at the network layer before it ever reaches an application.

02

Session integrity

Sessions are bound to the device and IP that created them.

Stolen session cookies are useless somewhere else. Sessions live in a hardened store with strict cookie flags, IP binding, and idle expiry. A leaked token alone doesn't grant access.

03

Device authorization

Unrecognized devices are challenged before sign-in completes.

First-time devices go through additional verification. Admins can review and revoke any registered device in one click. A password leak isn't enough — the attacker also needs your hardware.

04

Identity verification

Every request carries a tamper-proof identity claim.

Tokens are short-lived, signed, and verified at the edge before any request reaches application code. Forgery is mathematically infeasible — and tokens that should have expired actually do.

05

Content security

Browsers are told exactly what they may load and run.

A strict content security policy blocks injected scripts, untrusted images, and unauthorized iframes. Even if an attacker found an XSS vector, the browser refuses to execute it.

06

Upload guard

Files are inspected before they ever touch storage.

MIME types are validated against actual file contents — not just the filename. Oversized payloads, executable disguises, and known-bad signatures are rejected at the boundary.

07

Input sanitization

Every user input is type-checked and screened for injection.

API inputs are validated against strict schemas. Free-text fields pass through prompt-injection screening before reaching any AI surface. Garbage in is rejected before it can become garbage out.

08

Rate limiting

Bursts and brute-force attempts are throttled per actor.

Limits apply per user, per action, per tier — independently. A misbehaving script can't drown out a legitimate user, and a credential-stuffing attempt can't outpace lockout.

09

Audit & risk scoring

Every meaningful action is logged with a risk score.

Sensitive actions are recorded with actor, target, and a computed risk score. Anomalies surface in real time. An attacker leaves a trail — and the system notices the trail.

10

Prompt injection protection

User text is classified before it ever reaches a model.

Inputs that try to override AI instructions are flagged and blocked. The model only ever sees content the platform trusts, so jailbreaks never get the chance to fire.

11

Tenant isolation

Three independent layers all enforce the same rule.

Every database query, every middleware check, and every audit record verifies tenancy. To breach another tenant, an attacker would need to defeat three independent layers simultaneously — a defense-in-depth approach with zero shared state.

12

Permission check

Role and permission are verified on every API route.

There is no "trusted internal endpoint." Every route checks the caller's permission against the action they're attempting. A valid token for one role can't act as another.

13

Feature visibility

Users only see what they're allowed to use.

Modules and features are gated per role and per user. UI elements don't render, API routes don't respond, and search results don't include things the caller has no business seeing.

Proof of Intelligence

You don’t have to trust AI.
You can verify it.

Every AI recommendation in Kumty ships with four pieces of verifiable metadata. If it can’t show its work, it doesn’t ship.

Confidence score

0–100%, not a vibes rating. Derived from the quality and quantity of grounding evidence.

Evidence count

How many signals contributed to the recommendation — and you can drill into every one.

Reasoning

Why this recommendation, not just what. The logical chain from evidence to conclusion.

Impact estimate

Predicted effect on project health if you accept the recommendation. Measurable after the fact.

Built for Enterprise

Engineered from day one, not retrofitted.

87

database tables

317

API endpoints

3,000+

automated tests

13

security layers

Row-Level Security

Every table enforces RLS on the database itself. A bug in middleware can’t leak another tenant’s data.

Three-Layer Tenant Isolation

Database, middleware, and audit each enforce tenancy independently. Defeating one doesn’t help you.

Zero-Trust Networking

Mutual TLS between every service. No implicit trust, not even inside the mesh.

Architecture you can verify. Intelligence you can trust.

Every claim on this page maps to shipped, tested code. We'd rather show you than tell you.