Platform Architecture
Intelligence, not just features.
Every feature in Kumty is connected through one coherent intelligence system. It’s not twenty features bolted together — it’s one engine.
The Intelligence System
Six stages. One engine.
Data flows through six stages. Each stage feeds the next. The loop runs continuously. No stage is optional.
Outcomes feed back — continuously
- Data Layer87 tables · RLS1
- Feed Enginesignal scoring2
- AI Pipelineorchestrator → DAL → LLM3
- Twin Engine5-dim state4
- Action LayerL0–L4 autonomy5
- Learning Loopoutcomes → patterns6
Data Abstraction Layer
Your data never leaves your walls.
Most AI tools send your project data to external AI models. Kumty’s Data Abstraction Layer ensures zero project data reaches any external API. This isn’t a feature. It’s an architectural guarantee.
How it works
- 1
Analyze locally
Your data is collected and reasoned about inside your own perimeter. Nothing leaves yet.
- 2
Abstract the prompt
Only an anonymized, structurally faithful prompt is constructed. Nine PII categories are redacted: names, emails, budgets, dates, vendors, organizations, locations, phones, and identifiers.
- 3
Send the abstraction
The abstracted prompt — never the real data — is what travels to the LLM. Mappings stay in an ephemeral store with a 60-second TTL.
- 4
Map the response back
The model's answer is rehydrated against the ephemeral mapping, then the mapping is destroyed. The model never saw a real name, and the system never retains the bridge.
Defense in Depth
The 13-Layer Zero Trust Chain
Every request to the platform passes through thirteen independent security layers. No single failure exposes data. To breach the chain, an attacker would have to defeat all thirteen — at the same time.
01Network isolation
No service talks to another without a verified identity.
Network isolation
No service talks to another without a verified identity.
Every internal request between platform services is mutually authenticated and encrypted. A compromised pod can't impersonate another. Lateral movement is blocked at the network layer before it ever reaches an application.
02Session integrity
Sessions are bound to the device and IP that created them.
Session integrity
Sessions are bound to the device and IP that created them.
Stolen session cookies are useless somewhere else. Sessions live in a hardened store with strict cookie flags, IP binding, and idle expiry. A leaked token alone doesn't grant access.
03Device authorization
Unrecognized devices are challenged before sign-in completes.
Device authorization
Unrecognized devices are challenged before sign-in completes.
First-time devices go through additional verification. Admins can review and revoke any registered device in one click. A password leak isn't enough — the attacker also needs your hardware.
04Identity verification
Every request carries a tamper-proof identity claim.
Identity verification
Every request carries a tamper-proof identity claim.
Tokens are short-lived, signed, and verified at the edge before any request reaches application code. Forgery is mathematically infeasible — and tokens that should have expired actually do.
05Content security
Browsers are told exactly what they may load and run.
Content security
Browsers are told exactly what they may load and run.
A strict content security policy blocks injected scripts, untrusted images, and unauthorized iframes. Even if an attacker found an XSS vector, the browser refuses to execute it.
06Upload guard
Files are inspected before they ever touch storage.
Upload guard
Files are inspected before they ever touch storage.
MIME types are validated against actual file contents — not just the filename. Oversized payloads, executable disguises, and known-bad signatures are rejected at the boundary.
07Input sanitization
Every user input is type-checked and screened for injection.
Input sanitization
Every user input is type-checked and screened for injection.
API inputs are validated against strict schemas. Free-text fields pass through prompt-injection screening before reaching any AI surface. Garbage in is rejected before it can become garbage out.
08Rate limiting
Bursts and brute-force attempts are throttled per actor.
Rate limiting
Bursts and brute-force attempts are throttled per actor.
Limits apply per user, per action, per tier — independently. A misbehaving script can't drown out a legitimate user, and a credential-stuffing attempt can't outpace lockout.
09Audit & risk scoring
Every meaningful action is logged with a risk score.
Audit & risk scoring
Every meaningful action is logged with a risk score.
Sensitive actions are recorded with actor, target, and a computed risk score. Anomalies surface in real time. An attacker leaves a trail — and the system notices the trail.
10Prompt injection protection
User text is classified before it ever reaches a model.
Prompt injection protection
User text is classified before it ever reaches a model.
Inputs that try to override AI instructions are flagged and blocked. The model only ever sees content the platform trusts, so jailbreaks never get the chance to fire.
11Tenant isolation
Three independent layers all enforce the same rule.
Tenant isolation
Three independent layers all enforce the same rule.
Every database query, every middleware check, and every audit record verifies tenancy. To breach another tenant, an attacker would need to defeat three independent layers simultaneously — a defense-in-depth approach with zero shared state.
12Permission check
Role and permission are verified on every API route.
Permission check
Role and permission are verified on every API route.
There is no "trusted internal endpoint." Every route checks the caller's permission against the action they're attempting. A valid token for one role can't act as another.
13Feature visibility
Users only see what they're allowed to use.
Feature visibility
Users only see what they're allowed to use.
Modules and features are gated per role and per user. UI elements don't render, API routes don't respond, and search results don't include things the caller has no business seeing.
Proof of Intelligence
You don’t have to trust AI.
You can verify it.
Every AI recommendation in Kumty ships with four pieces of verifiable metadata. If it can’t show its work, it doesn’t ship.
Confidence score
0–100%, not a vibes rating. Derived from the quality and quantity of grounding evidence.
Evidence count
How many signals contributed to the recommendation — and you can drill into every one.
Reasoning
Why this recommendation, not just what. The logical chain from evidence to conclusion.
Impact estimate
Predicted effect on project health if you accept the recommendation. Measurable after the fact.
Built for Enterprise
Engineered from day one, not retrofitted.
database tables
API endpoints
automated tests
security layers
Row-Level Security
Every table enforces RLS on the database itself. A bug in middleware can’t leak another tenant’s data.
Three-Layer Tenant Isolation
Database, middleware, and audit each enforce tenancy independently. Defeating one doesn’t help you.
Zero-Trust Networking
Mutual TLS between every service. No implicit trust, not even inside the mesh.
Architecture you can verify. Intelligence you can trust.
Every claim on this page maps to shipped, tested code. We'd rather show you than tell you.