The comprehensive task-to-model mapping for the lineup. Every capability the family ships, mapped to the variant that actually performs it, with a per-cell verdict — full support, partial support, not supported, or dispatched to a sibling via the auto-router.
Forty-two tasks across seven bands. Marks reflect actual capability rather than badge-collection upgrades.
| Capability | Lino 1B | Eagle 13B | Griffin Lite 8B | Griffin S 14B | Griffin M 32B | Griffin L 70B | Griffin Zero 671B-MoE |
|---|---|---|---|---|---|---|---|
Detection & triage | |||||||
| Inline sink detection (deserialisation, SSRF-able URL builders, unsafe SQL) | |||||||
| Secret pattern detection (Gitleaks-class) | |||||||
| Sanitiser-quality scoring | |||||||
| Cross-scanner finding dedup | |||||||
| Taint path enumeration (single-package) | |||||||
| Taint path enumeration (cross-package) | |||||||
| Path ranking + clustering | |||||||
| Confidence scoring per candidate path | |||||||
Reasoning & hypothesis | |||||||
| Exploit-class hypothesis (CWE category mapping) | |||||||
| Exploit-trigger input synthesis | |||||||
| Cross-package taint chain reasoning (≤ 4 hops) | |||||||
| Cross-package taint chain reasoning (≤ 12 hops) | |||||||
| Cross-package taint chain reasoning (> 12 hops) | via routing | ||||||
| Multi-finding correlation in a single reasoning pass | |||||||
| Adversarial disproof pass (refute own hypothesis) | |||||||
| Structured reasoning trace output | |||||||
Remediation | |||||||
| Single-finding fix suggestion | |||||||
| Auto-fix PR with diff | |||||||
| Auto-fix PR with cited reasoning trace | |||||||
| Sanitiser-aware patch synthesis | |||||||
| Multi-service auto-fix campaign | |||||||
| Upstream coordinated-disclosure patch + draft | |||||||
Eval & gates | |||||||
| PR-time gate decision | via routing | ||||||
| Pre-merge policy evaluation | via routing | ||||||
| SARIF / CycloneDX / SPDX emit | |||||||
| Eval-harness scoring of candidate patches | |||||||
Context & scale | |||||||
| Context window 32k | |||||||
| Context window 64k | |||||||
| Context window 128k | |||||||
| Context window 256k (retrieval-gated) | |||||||
| Repo-wide reasoning (1k–5k packages) | |||||||
| Portfolio-wide reasoning (multi-repo) | |||||||
Deployment shape | |||||||
| On-device inference (no network egress) | |||||||
| Shared cloud | |||||||
| Dedicated cluster | |||||||
| VPC-isolated | |||||||
| Air-gapped / sovereign | |||||||
AI & MCP governance | |||||||
| Sensitive-data egress scanning | |||||||
| Prompt audit-log signing | |||||||
| MCP tool-call inspection | via routing | ||||||
"Via routing" means the variant does not perform the capability itself; the auto-router dispatches to a sibling when that capability is requested.
Inline gut check at the keystroke.
Wide-angle triage across the repo.
Cheapest deep reasoning tier.
PR-level reasoning, 64k window.
Repo-wide reasoning, 128k window.
Default production tier.
Deepest reasoning, sovereign tier.
The router is not a vibe. A single scalar collapses confidence, complexity, hop depth, and tenant tier into a bucket that maps to one variant.
Inline on the developer machine, sub-100 ms, no network egress. Catches the obvious unsafe primitives before they ever reach a build server.
Post-CI batched scan across every package. Ranks and clusters candidate paths and assigns each one a confidence score on the dataflow head.
The ranked queue is scored on a 0.0–1.0 scale using confidence, complexity, hop depth, and the deployment tier the tenant is on.
0.0–0.4 → Lite · 0.4–0.6 → S · 0.6–0.75 → M · 0.75–0.9 → L · 0.9–1.0 → Zero (sovereign tier only). The chosen variant emits the reasoning trace.
Zero is only reachable for tenants on a sovereign or air-gapped deployment tier. Below 0.4, Eagle's verdict ships as-is and no Griffin pass is requested.
The lineup is weighted for cybersecurity. It deliberately doesn't try to do the things below — a different model class would be the right tool.
The corpus is curated to defenders, taint graphs, CVE bodies, and patch diffs. We'd rather be excellent at a small set of security tasks than mediocre at a large set of unrelated ones.
The matrix is the spec sheet. Book a call and we'll map your workflow onto the variants — including which findings the router should escalate, and which it should let Eagle settle.