TECHNOLOGY · AETHER DYNAMICS AI
254/254 PLATFORM VALIDATION TESTS PASSED
11 CONTAINERIZED SERVICES
CLEARSKY · VECTOR · SENTINEL · SPACEPULSE
FAA · NIST · CISA ALIGNED
ITAR-AWARE BY DESIGN
Platform Architecture

An integrated safety, cyber, and compliance
platform for commercial space operations.

Four tightly coupled services. Eleven containerized components. Fail-closed security semantics. Designed for the operational realities of commercial spaceflight — not adapted from enterprise frameworks.

Platform Architecture

The core platform is a closed loop — safety events feed vulnerability intelligence, which informs risk scoring, which surfaces in the operator dashboard. Each service maintains explicit inter-service contracts and boundary isolation by design.

CLEARSKY
LIVE
VECTOR
LIVE
SENTINEL
LIVE
SpacePulse
LIVE BETA
Roadmap Extensions — Phase IV+
RegNav
ROADMAP
LaunchSBOM
ROADMAP
OrbitSim
ROADMAP

Core Platform

Four production-ready services. Deployable incrementally or as a unified platform.

CLEARSKY
Confidential Safety Reporting for Commercial Space Operators
Live · Phase I Ready
What It Does

A structured intake and de-identification pipeline for commercial space safety data. Reporter identity is removed at the point of entry. No PII enters the platform's published artifacts. The system is modeled on FAA AC 00-46F — the same voluntary safety reporting framework that transformed aviation safety culture.

Operator Outcome

Confidential anomaly reporting without exposing reporter identity or polluting operator workflows with unmanaged safety data. Safety events become structured intelligence — not legal exposure.

Operational Detail
  • Structured intake with de-identification at submission
  • No PII in published safety artifacts — by architecture, not policy
  • Configurable anomaly taxonomy aligned to FAA Part 450/460
  • Event correlation feed to VECTOR and SpacePulse
  • Pilot deployments open for commercial operators
Regulatory Alignment FAA AC 00-46F · 14 CFR Part 450/460 · NASA ASRS model
Validation Status 254/254 tests passing · Production-ready · Pilot intake open
VECTOR
Space-Specific Vulnerability Intelligence and SBOM Registry
Live · Phase I Ready
What It Does

Your mission software has dependencies you didn't choose and vulnerabilities you can't see. VECTOR maintains a space-specific CVE registry scored for spacecraft environments — not enterprise IT — and connects it directly to your SBOM. When a new CVE lands, VECTOR knows whether it touches your stack, how critical it is to your mission profile, and what to do next.

Operator Outcome

Your team stops chasing generic CVE feeds that weren't built for orbital systems. Vulnerability exposure is scored against your actual mission — payload class, orbit profile, system exposure — and surfaced before it becomes a mission risk.

Operational Detail
  • Space-CVE registry with mission-context scoring
  • SBOM Ingestor with CISA 2025 validation live
  • Coordinated disclosure portal for space vendors
  • STIX/TAXII feeds for SENTINEL and government subscribers
  • Mission risk correlation engine live
Regulatory Alignment NIST SP 800-161 · CISA 2025 SBOM Guidance · STIX 2.1 / TAXII 2.1
Validation Status Space-CVE registry live · SBOM Ingestor live · Mapped against CISA 2025 SBOM guidance
SENTINEL
Ground-Side Risk Correlator and Mission Scoring Engine
Live · Complete
What It Does

SENTINEL is a layered cyber defense and mission-risk monitoring system for commercial space operations, beginning with ground-based correlation and designed to expand into future on-orbit endpoint visibility. The platform maintains mission inventory — assets, payloads, orbital parameters, ground software stack linkage — and correlates that inventory against CVE alerts from VECTOR and incident data from CLEARSKY, computing a scalar CompositeRisk score per (mission, CVE) pair.

Operator Outcome

Answers the operationally critical question: which vulnerabilities actually threaten which active missions? Mission-aware risk scoring surfaced in real time — without manual correlation by ground operators.

Operational Detail
  • Mission inventory management — assets, payloads, orbital parameters, software stack
  • CVEAlert webhook intake from VECTOR — real-time correlation on new CVE registration
  • CompositeRisk scoring per (mission, CVE) pair — weighted model across five VectorScore dimensions
  • NIST AU-2/AU-3 structured audit records for all correlation and scoring operations
  • Risk scores surfaced to SpacePulse — high-severity alerts on CompositeRisk ≥ 7.0 or CVSS ≥ 9.0
Regulatory Alignment Architected in alignment with relevant NIST SP 800-53 control families · Zero Trust principles · CISA EDR guidance
Validation Status Mission inventory live · CVE correlation live · CompositeRisk scoring live · Async FastAPI stack
SpacePulse
Unified Operator Intelligence Dashboard
Live Beta · Intelligence Layer
What It Does

Most operators are managing safety events, CVE feeds, and mission risk in three separate tools — or no tools at all. SpacePulse aggregates output from CLEARSKY, VECTOR, and SENTINEL into a single ITAR-aware operator dashboard. Decision-makers see exactly what they need to act on. Nothing leaks across operator trust boundaries.

Operator Outcome

One view. Your safety events, vulnerability scores, and mission risk — correlated, filtered to your trust boundary, and ready for action. No manual aggregation. No cross-operator data exposure.

Operational Detail
  • Unified feed aggregating CLEARSKY, VECTOR, and SENTINEL
  • ITAR enforcement at routing time — before payload delivery
  • React 18 operator dashboard live
  • Feed API for downstream integrations
  • Service-boundary isolation by design — no cross-operator data leakage
Regulatory Alignment ITAR (22 CFR §§120-130) · EAR Part 734 · NIST Zero Trust Architecture
Validation Status Feed API live · React 18 dashboard live · Beta intake open
Fail-Closed Security Behavior

The platform denies access by default. No open-by-default states. If a trust decision cannot be resolved, the system closes — not opens.

ITAR Enforced at Routing Time

ITAR-controlled payloads are identified and routed before delivery — not filtered at the presentation layer. Enforcement is structural, not conditional.

No PII in Published Artifacts

Reporter identity is removed at intake. PII cannot traverse the platform's published data paths — enforced by architecture, not access policy.

Audit-Backed Critical Operations

Every critical operation generates an audit record. Audit trails are append-only and cannot be modified by application-layer processes.

Service-Boundary Isolation by Design

Each service maintains explicit inter-service contracts. No implicit data sharing across operator trust boundaries. Schema ownership is defined at the service level.

Regulatory Alignment by Default

Compliance is architectural — not a configuration option. FAA, NIST, and CISA alignment is built into the data models and workflows, not added post-deployment.

254/254 Tests Passing

Every containerized service has a dedicated test suite. All 254 platform validation tests pass across the full stack.

CLEARSKY smoke
17
API Gateway
27
Vault
25
Publish
44
VECTOR registry
14
SBOM Ingestor
23
SENTINEL
44
SpacePulse feed
24
Vitest frontend
4
Audit sink
10
DEID WORKER
13
GOLDEN
4
E2E reporter
5
Total
254/254
For Government & Procurement
Government or procurement team? View our capability statement, compliance matrix, and CAGE/UEI details.
View Capability Statement →

Phase IV+ Extensions

Targeted for NASA SBIR funding and non-dilutive grants. Not included in the current pre-seed scope.

RegNav
Roadmap · Phase IV

Compliance co-pilot that maps mission details — orbit, payload, customer class — to a machine-readable compliance profile covering FAA, DoD, and export-control obligations.

LaunchSBOM
Roadmap · Phase V

Pre-launch software certification gateway. Combines SBOM with the RegNav compliance profile, calls VECTOR /certify, and issues a cryptographic launch attestation — or blocks on critical unresolved vulnerabilities.

OrbitSim
Roadmap · Phase VII

Digital-twin response sandbox. Tests every patch and configuration change against a mission-fidelity twin before uplink — outputs validated playbooks fed back into VECTOR and CLEARSKY.

Accepting design partner operators for Q2/Q3 2026 pilot program. Typical starting point: CLEARSKY confidential intake or VECTOR SBOM gap analysis. Deliverable: a structured risk report and SBOM coverage assessment across your mission inventory, completed within the evaluation window.
01
Discovery Session

We review your current operational environment, mission profile, and compliance obligations.

02
Architecture Review

We walk through the platform architecture, data-flow contracts, and integration approach for your stack.

03
Scoped Pilot

A time-bounded deployment scoped to one or two services — CLEARSKY intake or VECTOR SBOM scanning are typical starting points.

04
Evaluation Window

Operators assess the platform against their operational criteria with full access to configuration and output data.

05
Next Step

We provide a tailored deployment recommendation based on the pilot evaluation. No commitment required to begin.

Request a Pilot Discussion