Solutions · Platform Capabilities

What the platform can do. Capability by capability, layer by layer.

Seven categories. Roughly fifty capabilities. Each one with a two-sentence description and a clear answer to what powers it. For the full line-item inventory of every model, scanner, and feed, see . For the per-model task matrix, see .

~50
Capabilities
7
Categories
Griffin · Eagle · Lino
Models behind them all
1
Unified API surface
01 /
Category 01

Detection.

The platform reads your code, containers, manifests, and history and flags what is actually wrong. Eight different detection paths feed one normalised verdict, so a finding from a sink scan, a CVE feed, and a license rule all land in the same review queue.

01.01

Inline sink detection

Catches deserialization, SSRF, unsafe SQL, prototype pollution, and ReDoS as the developer types. Runs at sub-100 ms p95 because it does not phone home.

Powered by: Lino on-device
01.02

Secret pattern detection

Finds API keys, OAuth tokens, signing keys, and database credentials across the working tree and commit history. Combined regex baseline with a learned classifier to suppress noise.

Powered by: Gitleaks + Lino
01.03

Sanitiser-quality scoring

Grades the strength of every sanitiser the codebase relies on, so a weak escape function does not get treated like a strong one. Each call site gets a confidence score, not a boolean.

Powered by: Lino + Griffin Lite
01.04

Container CVE detection

OS-package and application-layer vulnerability matching against curated databases for every layer in an image. Works on registries, build tarballs, and running pods.

Powered by: Trivy + Grype
01.05

Open-source vulnerability scanning

Purl-precise matching of every direct and transitive dependency against the public advisory ecosystem. Range-aware so a partially-patched version is still flagged correctly.

Powered by: OSV + GHSA
01.06

Malicious-package detection

Spots typosquats, dependency confusion, and post-install hook anomalies before the package ever resolves into a lockfile. Score blends name distance, age, signal entropy, and behaviour heuristics.

Powered by: Malicious-package scanner
01.07

License compliance scanning

SPDX-aware license detection with obligation classification and policy hooks. Surfaces strong-copyleft, attribution, and patent-grant terms separately so legal review is targeted.

Powered by: License scanner (SPDX-aware)
01.08

Source code complexity + churn

Project-wide size, language mix, and rate-of-change measurement so risk weighting reflects where the team is actually moving. Used as a prior by every downstream model.

Powered by: SCC
02 /
Category 02

Reasoning.

Detection finds candidate issues; reasoning decides whether they are real, how they connect, and what they would let an attacker do. This is the model layer doing the work an analyst would do, with a structured trace you can audit.

02.01

CWE classification

Every candidate finding is mapped to the appropriate CWE class with a justification snippet. Lets the rest of the pipeline reason about category, not just symptom.

Powered by: Griffin Lite/S
02.02

Exploit-class hypothesis

Generates plausible exploit shapes for a finding given its sinks, reachable sources, and surrounding sanitisers. Outputs are hypotheses, not assertions, and travel into the disproof pass.

Powered by: Griffin S/M/L
02.03

Cross-package taint chains (≤12 hops)

Tracks data flow from untrusted source to dangerous sink across module boundaries up to twelve hops deep. Cites the file, function, and line at every step in the chain.

Powered by: Griffin L
02.04

Cross-package taint chains (>12 hops)

When the path is longer than twelve hops or threads through framework internals, this routes to a deeper reasoner that holds the full graph in context. For the hardest chains in the codebase.

Powered by: Griffin Zero
02.05

Multi-finding correlation in one pass

Treats the entire finding set as a single context window so it can spot duplicates, dependency clusters, and root causes that single-finding reasoning misses. Cuts queue volume sharply.

Powered by: Griffin M/L
02.06

Adversarial disproof pass

Each hypothesis is sent through a second pass that actively argues the finding is wrong. Only hypotheses that survive this attack become the verdict you see.

Powered by: Aegis disproof head
02.07

Structured reasoning trace

Every verdict ships with a HYPOTHESIS, CITED PATH, DISPROOF, and PROPOSED PATCH block. Auditable, replayable, and stable across model upgrades.

Powered by: Every Griffin variant
02.08

Path ranking + clustering

Eagle takes thousands of candidate paths and ranks them by reachability and exploitability, then clusters near-duplicates so the queue is in priority order before a human looks at it.

Powered by: Eagle
03 /
Category 03

Remediation.

Verdicts are useful only if a fix lands. This category covers everything from a one-line suggestion in the IDE to a multi-service patch campaign that opens PRs, runs tests, and tracks the merge.

03.01

Single-finding fix suggestion

Inline patch suggestion at the cursor for the cheapest class of fixes. Designed for IDE latency, with a reasoning trace one keystroke away.

Powered by: Griffin Lite
03.02

Auto-fix PR with cited reasoning trace

Generates a pull request that fixes the issue and links the full structured reasoning trace in the description. The reviewer sees the why, not just the diff.

Powered by: Griffin S/M/L
03.03

Sanitiser-aware patch synthesis

When a fix requires inserting or strengthening a sanitiser, the model picks the right one for the framework, not a generic placeholder. Reads the project's existing patterns first.

Powered by: Griffin L
03.04

Multi-service auto-fix campaign

Drives the same fix across dozens of services in coordinated waves with per-repo PRs, rollback hooks, and a campaign-level dashboard. For the upgrades that used to take a quarter.

Powered by: Griffin M/L + Auto-Fix
03.05

Coordinated disclosure upstream patch + draft

When the root cause is in an upstream open-source dependency, the platform drafts the upstream patch and the disclosure note in parallel with your local mitigation.

Powered by: Griffin Zero
03.06

Patch-pass-test sandbox

Every auto-fix is applied inside an ephemeral sandbox that runs the project's test suite before the PR is opened. A failing patch never reaches a reviewer.

Powered by: The auto-fix runner
03.07

Compatibility-tested upgrades

Major-version dependency bumps are validated against your real test suite with breaking-change analysis attached. You get a green PR or a clear blocker, not a guess.

Powered by: Griffin L + test runner
04 /
Category 04

Governance.

Policy is the difference between a finding and a decision. This category covers authoring, enforcing, and exception-managing the rules that decide what merges, what deploys, and what an agent is allowed to do.

04.01

Policy authoring (rego-style DSL)

Write policies in a familiar, declarative DSL with type checking, dry-run replay against historical findings, and versioned releases. The policy is the source of truth.

Powered by: The policy engine
04.02

Pre-merge policy gate (CI)

Runs in the CI pipeline and blocks merges that violate policy, with the violating finding and its trace surfaced inline on the PR. No back-channel approvals.

Powered by: Policy engine + Griffin
04.03

Admission-controller gate (Kubernetes)

Kubernetes admission webhook that rejects workloads whose SBOM or runtime posture violates policy. Stops drift between what passed CI and what is actually running.

Powered by: Policy engine + admission controller
04.04

Break-glass workflow with auto-expiry

Temporary policy waivers with a hard expiry, a named approver, a justification field, and a full audit-log entry. Closes on its own; cannot be quietly extended.

Powered by: Policy engine + audit log
04.05

MCP-server capability scoping

Each agent identity gets a narrowly scoped set of allowed tools, files, and network reaches. Out-of-scope calls are denied at the server, not the agent.

Powered by: MCP Server + Lino on egress
04.06

Sensitive-data egress guardrails

Outgoing prompts and tool calls are inspected by an on-device classifier for secrets, PII, and intellectual property before they leave the boundary. Block, redact, or quote.

Powered by: Lino + MCP Server
04.07

Prompt audit log with chain-of-custody

Every prompt, tool call, and model response is recorded into an append-only signed log. Reproducible runs, regulator-grade trail.

Powered by: MCP Server + sigstore
04.08

Capability scoping per agent identity

Different agents (CI, IDE, on-call, vendor) see different toolsets, file roots, and rate limits, all driven by signed identity. No shared god-mode token.

Powered by: MCP Server
05 /
Category 05

Compliance & Evidence.

Auditors do not want screenshots; they want signed artefacts. This category produces the documents that map your platform output to whichever framework the regulator is asking about this week.

05.01

Continuous SBOM emission

Every build emits a signed bill of materials in both CycloneDX 1.6 and SPDX 2.3, including dependency relationships, license metadata, and vulnerability annotations.

Powered by: SBOM Studio
05.02

In-toto + sigstore provenance attestation

Signed attestations for every build step, scan run, and patch application. Verifiable chain-of-custody from source commit to deployed image.

Powered by: SBOM Studio + signing pipeline
05.03

VEX statement authoring

Author and publish CycloneDX or CSAF VEX statements that record exploitability decisions per component. Downstream consumers stop firing on irrelevant CVEs.

Powered by: SBOM Studio
05.04

Pre-mapped compliance frameworks

Control-by-control bindings for SOC 2, ISO 27001, FedRAMP HIGH, CMMC, NIST SP 800-218, EO 14028, NIS2, DORA, DPDP, and HIPAA. Refreshed when the frameworks revise.

Powered by: Compliance pack library
05.05

Customer questionnaire automation

Maps your evidence store to the questions on a customer security questionnaire and drafts the answers, with citations. A two-day exercise becomes an hour.

Powered by: Evidence store + Griffin
05.06

Signed audit log export

Append-only audit log exported in JSON plus CycloneDX evidence form, signed and verifiable. Hand it to the regulator without a phone call.

Powered by: Audit pipeline
05.07

Regulator trust packet (one-click)

Bundles SBOMs, attestations, audit logs, compliance mappings, and exception records into a single signed archive ready for submission. Pre-formatted per framework.

Powered by: Compliance pack + portal
05.08

AI-BOM

An inventory of every model, prompt, and tool an agent touched in your SDLC, with versions and access scopes. The bill of materials for the AI side of the supply chain.

Powered by: MCP Server + scanner
06 /
Category 06

Deployment & Infrastructure.

The platform runs wherever your trust boundary requires. Five deployment tiers and two specialised inference modes cover everything from a hosted multi-tenant trial to a sovereign air-gapped install.

06.01

Shared cloud (multi-tenant)

Tier 1 deployment. Fastest onboarding with per-tenant prompt and KV-cache isolation. Best fit for teams that need the full surface without operating the cluster.

Powered by: Tier 1
06.02

Dedicated cluster (single-tenant)

Tier 2 deployment. Isolated hardware, SHA-pinned weight attestation, deterministic latency. Same platform, your own inference plane.

Powered by: Tier 2
06.03

VPC-isolated deployment

Tier 3 deployment. The full platform runs inside your VPC with bring-your-own KMS and customer-controlled network boundaries. No data leaves your perimeter.

Powered by: Tier 3
06.04

Air-gapped operation

Tier 4 deployment. No outbound network egress, on-prem GPU, offline vulnerability database bundles, and signed export pipelines for the audit log.

Powered by: Tier 4
06.05

Sovereign deployment with full Griffin Zero

Tier 5 deployment. In-country residency, regulator-attested key custody, and the full reasoning ladder including the 671B mixture-of-experts variant on-prem.

Powered by: Tier 5
06.06

Auto-scaling GPU pool

Eagle and the larger Griffin variants run on a managed batched-inference pool that scales to demand. You pay for throughput, not idle GPUs.

Powered by: Infra
06.07

On-device inference

Lino runs entirely on developer hardware with no network egress. Inline IDE checks, secret detection, and egress classification stay on the machine.

Powered by: Lino
07 /
Category 07

Operations.

The platform comes with operating commitments, not just software. SLAs, support tiers, audit streaming, training, and a published roadmap turn the engagement into a relationship you can run a programme against.

07.01

99.5–99.95% application-layer SLA

Availability targets for the API, portal, and MCP surfaces scale with the tier you choose. Credits are attached to misses; reports are published monthly.

Powered by: Tier-scaled commitments
07.02

L2/L3 support from Safeguard engineering

Direct access to the engineers who wrote the code, on a real on-call rotation. No vendor support tier sits between you and the source.

Powered by: Engineering on-call
07.03

Monthly SLA reports + quarterly business reviews

Raw uptime, latency, and incident timelines monthly. A QBR every quarter covers posture, roadmap, and what to plan for next.

Powered by: Operations team
07.04

Customer-controlled audit log streaming

Append-only audit events streamed to your SIEM in real time with SIEM-ready schemas. You own the storage; we own the delivery.

Powered by: Audit pipeline
07.05

24-hour breach notification commitment

A contractual commitment to notify within 24 hours of confirmed compromise affecting your tenant. With facts, not a placeholder email.

Powered by: Security operations
07.06

Roadmap visibility under NDA

Quarterly roadmap brief covering upcoming model variants, scanner additions, compliance packs, and deployment shapes. Under NDA so we can be specific.

Powered by: Product
07.07

Training & certification programmes

Enablement curriculum for security, platform, and engineering teams. Refreshed at each model release and credentialed for procurement.

Powered by: Customer education
07.08

Public threat intelligence feed

RSS, JSON, and STIX feeds of malicious-package finds, novel exploit classes, and remediation guidance. Free to read; useful even without a contract.

Powered by: Threat research
Honesty box

What is not a capability we ship.

The platform is single-purpose by design. Here is what is deliberately out of scope so you do not have to ask.

Out of scope, on purpose

  • General-purpose code generation outside a security context. Safeguard Code reasons about supply chain; it will not draft a marketing site or a Pokédex.
  • Image, video, voice, or chat-companion generation. The platform is single-purpose by design.
  • End-user customer support chatbots. We ship to your security and engineering teams, not your support queue.
  • Payment processing, billing, or financial workflows. Out of scope on purpose.
  • Network traffic monitoring, EDR, or endpoint posture. We sit upstream of those tools and federate findings to them, but we are not their replacement.
  • Generic data analytics, BI dashboarding, or warehouse modelling. We export evidence; we do not replace your data platform.
Related views

Same platform, different lenses.

This page is the capability ledger. The pages below cut the same surface from a different angle.

Fifty capabilities. One platform call.

Detection, reasoning, remediation, governance, compliance, deployment, operations. Pick the slice you need; we ship the rest under the same contract. Book a walk-through and we will demo the capabilities most relevant to your stack.