Skip to content
@scutum-defense

Scutum

Sovereign Infrastructure Defense Operating System

  ███████╗ ██████╗██╗   ██╗████████╗██╗   ██╗███╗   ███╗
  ██╔════╝██╔════╝██║   ██║╚══██╔══╝██║   ██║████╗ ████║
  ███████╗██║     ██║   ██║   ██║   ██║   ██║██╔████╔██║
  ╚════██║██║     ██║   ██║   ██║   ██║   ██║██║╚██╔╝██║
  ███████║╚██████╗╚██████╔╝   ██║   ╚██████╔╝██║ ╚═╝ ██║
  ╚══════╝ ╚═════╝ ╚═════╝    ╚═╝    ╚═════╝ ╚═╝     ╚═╝

Sovereign Infrastructure Defense


TypeScript Python Go Terraform Kubernetes PostgreSQL React


We build software that helps nations protect critical infrastructure. Scutum fuses multi-modal sensor data into a unified operating picture, generates ranked courses of action, requires human authorization before execution, validates outcomes through digital twin simulation, and produces cryptographically auditable command trails — all deployed within sovereign boundaries.

  SENSE               FUSE                DECIDE              AUTHORIZE           VALIDATE            AUDIT
  ┌─────────┐        ┌─────────┐        ┌─────────┐        ┌─────────┐        ┌─────────┐        ┌─────────┐
  │ Video   │──┐     │         │        │ Ranked  │        │ Human   │        │ Digital │        │ Hash-   │
  │ Thermal │──┤     │ Signal  │───────>│ Course  │───────>│ Operator│───────>│  Twin   │───────>│ Chained │
  │ RF      │──┼────>│ Fusion  │        │   of    │        │ Approval│        │  Gate   │        │ Audit   │
  │ OT/SCADA│──┤     │ Engine  │        │ Action  │        │         │        │         │        │ Trail   │
  │ AIS     │──┤     │         │        │         │        │         │        │         │        │         │
  │ ADS-B   │──┘     └─────────┘        └─────────┘        └─────────┘        └─────────┘        └─────────┘

Open Source

We publish the building blocks of sovereign infrastructure defense under Apache 2.0.

Detection & Security

scutum-detect

Declarative threat detection rules engine. Threshold, sequence, and correlation matchers with MITRE ATT&CK mapping.

scutum-detection-packs

15 curated detection rules across 6 sectors: port, energy, airspace, maritime, OT, cyber-physical. Response playbooks and false positive guidance.

scutum-policy-engine

Policy-as-code evaluation. Operational, safety, and sovereignty constraints with deny/require_approval/warn/allow verdicts.

scutum-safe-logging

Structured safe logging with SafeArg/UnsafeArg. Prevents sensitive data leakage with automatic field detection and redaction guards.

scutum-audit-chain

Tamper-evident SHA-256 hash-chained audit trails. Cryptographic verification and tamper detection for command records.

scutum-eslint-config

Shared ESLint configuration for defense-grade TypeScript. Bans console.log, eval, enforces complexity limits and strict types.

Simulation & Geospatial

scutum-twin

Digital twin simulation. Validate proposed actions against infrastructure models before execution. Outcomes: safe, unsafe, uncertain, degraded.

scutum-geo

Geospatial primitives. Zone classification, corridor deviation, threat corridor projection, haversine, point-in-polygon.

Platform & Integration

scutum-event-kit

Type-safe event bus with middleware pipeline, typed subscriptions, and the Scutum event protocol (12 event types).

scutum-schemas

Canonical schema registry. 15 versioned schemas across events, entities, workflows, and geospatial primitives.

scutum-codegen

Contract-first code generation. TypeScript interfaces + clients and Python Pydantic models from schema definitions.

SDKs & Developer Tools

scutum-sdk

TypeScript SDK. Type-safe API client, SSE event streaming, authentication, and domain types.

scutum-python-sdk

Python SDK. Sync and async clients with Pydantic v2 validation, mypy strict, tested across Python 3.10–3.12.

scutum-cli

Command-line interface. Platform health, incident inspection, audit trail queries, validation.

Deployment & Infrastructure

scutum-terraform-provider

Terraform provider for zones, corridors, detection rules, policies — infrastructure-as-code for the platform.

scutum-helm

Kubernetes Helm charts for sovereign single-tenant deployment. Network policies, security contexts, sovereignty config.

scutum-starter-app

React starter template. Pre-built hooks and components for building applications on the Scutum platform.

Engineering Standards

scutum-engineering-guide

Style guides for TypeScript, API design, security, testing, and defense-specific patterns (human-in-loop, audit chain, policy gate, twin validation).


Architecture

┌────────────────────────────────────────────────────────────────────────────────┐
│                          SCUTUM COMMAND PLATFORM                              │
│                                                                                │
│    Operator Surfaces                                                           │
│    ┌────────────┐  ┌────────────┐  ┌────────────┐  ┌────────────┐            │
│    │  Command   │  │  Decision  │  │  Twin      │  │  Audit &   │            │
│    │  Console   │  │  Workspace │  │  Validation│  │  Sovereignty│            │
│    └─────┬──────┘  └─────┬──────┘  └─────┬──────┘  └─────┬──────┘            │
│          └───────────────┴───────────────┴───────────────┘                     │
│                            Event Bus (event-kit)                               │
│          ┌───────────────┬───────────────┬───────────────┐                     │
│    ┌─────┴─────┐   ┌─────┴─────┐   ┌─────┴─────┐   ┌─────┴─────┐           │
│    │  Signal   │   │  AI COA   │   │  Approval  │   │  Audit    │           │
│    │  Ingestion│   │  Engine   │   │  Service   │   │  Logger   │           │
│    └───────────┘   └───────────┘   └───────────┘   └───────────┘           │
│                                                                                │
│    Core Libraries                                                              │
│    ┌────────┐ ┌────────┐ ┌────────┐ ┌────────┐ ┌────────┐ ┌────────┐        │
│    │ detect │ │ policy │ │ audit  │ │  twin  │ │  geo   │ │  safe  │        │
│    │  +packs│ │ engine │ │ chain  │ │        │ │        │ │ logging│        │
│    └────────┘ └────────┘ └────────┘ └────────┘ └────────┘ └────────┘        │
│                                                                                │
│    ┌───────────────────────────────────────────────────────────────────┐       │
│    │  event-kit · schemas · codegen · eslint-config · engineering-guide│       │
│    └───────────────────────────────────────────────────────────────────┘       │
│                                                                                │
│    SDKs & Integration                                                          │
│    ┌───────────────────────────────────────────────────────────────────┐       │
│    │  sdk (TS) · python-sdk · cli · terraform-provider · starter-app  │       │
│    └───────────────────────────────────────────────────────────────────┘       │
│                                                                                │
│    Infrastructure                                                              │
│    ┌───────────────────────────────────────────────────────────────────┐       │
│    │  PostgreSQL · Redis · Docker · Helm · Sovereign Single-Tenant    │       │
│    └───────────────────────────────────────────────────────────────────┘       │
└────────────────────────────────────────────────────────────────────────────────┘

Principles

Sovereign by default All data, compute, and audit trails remain within national boundaries. Single-tenant. No shared infrastructure.
Human-in-the-loop No autonomous action without explicit operator authorization. AI recommends, humans decide.
Auditable by design Every decision produces a hash-chained, policy-labeled, tamper-evident record.
Safe by construction No OT write without twin validation. Policy engine enforces safety at every boundary.
One platform One ontology, one release train. Extend through schemas and detection packs, not forks.
Open core Defense primitives are open source. Product platform is proprietary.

Engineering Standards

Every repository ships with CI/CD, security scanning (CodeQL + TruffleHog), automated dependency updates (Renovate), CODEOWNERS, semantic versioning, and changelogs. See the engineering guide for our TypeScript, API design, security, testing, and defense pattern standards.



Abu Dhabi, UAE   ·   scutum.defense

Popular repositories Loading

  1. .github .github Public

    Organization-wide templates, workflows, review policies, and engineering standards for Scutum.

    1

  2. scutum-sdk scutum-sdk Public

    Official TypeScript SDK for integrating with the Scutum Command Platform

    TypeScript

  3. scutum-schemas scutum-schemas Public

    Canonical schema definitions for the Scutum platform — event models, entity types, workflow contracts, and geospatial primitives

    TypeScript

  4. scutum-detect scutum-detect Public

    Declarative threat detection rules engine for critical infrastructure defense

    TypeScript

  5. scutum-geo scutum-geo Public

    Geospatial primitives for defense infrastructure mapping, zone classification, and threat corridor projection

    TypeScript

  6. scutum-audit-chain scutum-audit-chain Public

    Tamper-evident, hash-chained audit trails for sovereign defense command operations

    TypeScript

Repositories

Showing 10 of 19 repositories

People

This organization has no public members. You must be a member to see who’s a part of this organization.

Top languages

Loading…

Most used topics

Loading…