// LOCAL-FIRST AI OPS PLATFORM

One platform.
Unlimited operations.

Master Chief gives security teams a unified command center for multi-model LLM orchestration, automated pentest pipelines, and agent swarm operations — running entirely on your hardware. No data leaves your infrastructure unless you say so.

VIEW PRICING STAR ON GITHUB
$ python master_chief_api.py --port 8090
✓ Auth: 3-tier RBAC + JWT active
✓ Models: 11 providers connected (Ollama, OpenRouter, Anthropic...)
✓ Audit log: logs/audit/2026-04-18.jsonl
⚡ 349 routes ready — clearance enforced
──────────────────────────────────────────
$
349API Routes
11LLM Providers
60+Dashboard Panels
0Data Leaks
SHA-256 verified every build 3-tier RBAC (clearance 0/5/10) Append-only JSONL audit logs Air-gap ready WAL-mode SQLite (concurrent-safe) SlowAPI rate limiting CSP + HSTS headers SBOM published

Everything your security team needs.
Nothing it doesn't.

Built for practitioners, hardened for enterprise, deployed on your own hardware.

Multi-Model LLM Router

Route queries across GPT-4, Claude, Gemini, Ollama, LM Studio, and OpenRouter automatically. Elo-rated model selection with circuit breakers and cost tracking per request.

🔍

Automated Pentest Pipeline

Recon → exploit → report with human approval gates. Integrates Nmap, Nuclei, SQLmap, Metasploit, and custom payloads into a single orchestrated workflow.

🤖

Agent Swarm Orchestration

Zero Trust Architecture for agent-to-agent delegation. Cryptographic bidding, reputation slashing, compartmentalised blackboard — agents that work while you sleep.

🛡️

War Room — Incident Response

Real-time incident coordination panel. Assign tasks, track findings, maintain chain of custody, and generate client-ready reports without leaving the platform.

🔐

Encrypted Secrets Vault

DPAPI-encrypted vault for API keys, credentials, and findings. Zero plaintext-at-rest. Rotating key manager with spend caps to prevent runaway API costs.

📊

Knowledge Graph Memory

Persistent graph of everything your agents learn. Cross-session context, semantic search across all past findings, and automatic relationship extraction.

📱

Android Forensics Suite

ADB-powered device management, data extraction, forensic imaging, and vulnerability assessment — built into the same dashboard as everything else.

🌐

Local-First, Air-Gap Ready

No telemetry by default. No external calls unless you configure them. Runs on a laptop, a homelab server, or a classified workstation. You own your data entirely.

📋

SOC2-Ready Audit Trail

Append-only JSONL audit logs for every authenticated request. Fields: timestamp, user, role, IP, key prefix, path, status, duration. Daily rotation. SIEM-compatible. Infrastructure produces the evidence — formal certification by a licensed auditor is a separate engagement.

🏢

Multi-Tenant Workspace Isolation

Cryptographically isolated workspaces per client. Agents, vaults, generated telemetry, and audit logs are strictly partitioned — Client A's data can never bleed into Client B.

Built for people who ship real security work.

🎯

Pentesters & Red Teams

Replace 6 disconnected tools with one platform. Run automated recon-to-report pipelines while you focus on the high-value adversary emulation.

🏢

Security Operations Centres

Single pane of glass for multi-model AI, agent swarms, and incident response. Full audit trail for compliance. Runs on your infrastructure — not a vendor's cloud.

🔧

AI/ML Infrastructure Engineers

Stop wiring together model providers manually. Master Chief routes, tracks cost, handles failures, and benchmarks quality across every provider you use.

🏪

MSSPs & Boutique Firms

White-label the platform per client. Per-instance pricing, full isolation, client-ready reporting. Turn a week-long engagement into a 3-day one.

💻

Solo Researchers & Indie Hackers

Get the capabilities of a full security team without the team. $29/mo for everything core — model router, knowledge graph, encrypted vault, and audit logs.

🏛️

Defence & Government

Fully on-premise. Zero external dependencies. SBOM published. Clearance-level RBAC. Essential Eight aligned. IRAP assessment pathway available on request. Contact for enterprise procurement.

No VC money, no price gouging.

All prices in AUD. GST-inclusive where applicable. Cancel any time — no lock-in. 14-day refund on paid tiers.

Free
$0/mo

Self-hosted. Core features. Great for trying it out.

  • Core AI assistant
  • Model router (3 providers)
  • 50 requests/day
  • Community support
  • GitHub — install yourself
GET ON GITHUB
Tactical
$149/mo AUD

For small security teams that need to move fast.

  • Everything in Solo
  • 5 user seats
  • War Room panel
  • Agent swarm (10 agents)
  • 2,500 requests/day
  • Priority email support
START TACTICAL
Command
$499/mo AUD

Mid-size teams and growing security practices.

  • Everything in Tactical
  • 25 user seats
  • Plugin system (50+ power-ups)
  • Agent swarm (50 agents)
  • 10,000 requests/day
  • Priority support + SLA
START COMMAND
Strategic
$1,999/mo AUD

MSSPs, government, and enterprise with on-prem requirements.

  • Everything in Command
  • Unlimited user seats
  • On-prem deployment
  • MSSP white-label rights
  • SSO / SAML
  • Dedicated CSM + named engineer
START STRATEGIC

Volume / multi-year / non-profit pricing? Reach out →

Common questions.

Does my data leave my machine?
No — unless you explicitly configure an external model provider (OpenRouter, Anthropic, etc.). By default, Master Chief routes queries to your local Ollama or LM Studio instance. There is zero telemetry. The only outbound traffic is what you set up yourself.
What does "local-first" mean in practice?
It means the platform runs on your hardware, stores data in your SQLite databases, and uses your model providers. You can use it completely offline. No account, no cloud sync, no vendor lock-in. The paid subscription unlocks features — it does not host your data.
How does billing work? Is there a free trial?
The Free tier is permanently free — install from GitHub and self-host. Paid tiers are billed monthly in AUD via Stripe. Click any paid tier to go straight to secure Stripe checkout — your license key is emailed to you seconds after payment. 14-day refund policy on paid tiers. Cancel any time — no contract.
Can I run it on a Windows machine? Linux? Mac?
Yes to all three. Master Chief is Python + React — no platform-specific binaries required. Tested on Windows 11, Ubuntu 22.04, and macOS Ventura. The pentest modules have the widest tool coverage on Linux, but the core platform is fully cross-platform.
What LLM providers does it support?
Ollama, LM Studio, OpenRouter, Anthropic (Claude), OpenAI (GPT-4/o), Google Gemini, Groq, Mistral, Cohere, Together.ai, and any OpenAI-compatible endpoint. The model router benchmarks them and routes to the best available option based on your configuration.
Does "SOC2-Ready" mean you're SOC2 certified?
No — and we won't claim that. SOC2 certification requires a licensed CPA auditor to formally attest your controls, typically costing $30k–$100k+. "SOC2-Ready" means Master Chief produces the exact evidence that auditor needs: append-only access logs, key rotation history, RBAC records, and a one-click Compliance Evidence Pack. When you are ready to certify your organisation, you hand the ZIP to the auditor — the work is already done.
Is this enterprise-ready?
Yes. Completed hardening includes: WAL-mode SQLite, WebSocket backpressure guards, rate limiting on all sensitive routes (SlowAPI global middleware), full SOC2-style audit logging, security response headers (CSP, HSTS, X-Frame-Options), secrets startup validator, SBOMs, dependency vulnerability sweep, and 3-tier clearance-based RBAC. Full posture doc at docs/security/enterprise-readiness-report.md.
Can MSSPs white-label it?
Yes — on the Strategic tier. You get white-label rights, per-client instance deployment, and a dedicated CSM. Revenue-share MSSP licensing is available for high-volume partners. Contact us to discuss.

Ready to consolidate your security stack?

Start with the free self-hosted version, or go straight to Solo for $29/mo.

STAR ON GITHUB VIEW PRICING