Blaze: Multi-Tenant
Agentic SDLC Platform
Enterprise governance for AI-assisted development — across every coding agent. One framework, any platform, complete audit trail.
Why Teams Need Governed AI Development
As AI coding agents proliferate across engineering teams, organizations face compounding governance, compliance, and quality risks without a unified oversight framework.
Ungoverned AI Coding
AI agents operate without guardrails, producing code that skips security reviews, ignores architectural standards, and bypasses compliance checkpoints. No visibility into what agents are doing or why.
- No enforcement of coding standards
- Security vulnerabilities introduced silently
- Architectural drift goes undetected
- No audit trail for regulatory review
No Evidence Trail
Compliance auditors require proof that decisions were made deliberately. AI-generated code leaves no traceable chain from requirements to implementation to testing, creating significant compliance gaps.
- SOC 2 / ISO 27001 audit failures
- Cannot demonstrate due diligence
- Requirements traceability broken
- Decision rationale lost forever
Platform Lock-In
Teams investing in one AI coding platform face switching costs when better tools emerge. Custom agents, prompts, and workflows tied to a single vendor create long-term strategic risk.
- Claude Code agents use different metadata formats than OpenCode agents
- OpenCode plugins and permission models unavailable in Claude Code
- Retraining cost when switching tools
- No portability of institutional knowledge
Manual Governance Doesn't Scale
As AI accelerates output, manual review processes become the bottleneck. Human reviewers cannot keep pace with AI-generated PRs, leading to rubber-stamping or dangerous backlogs.
- Review queues block delivery
- Quality assurance degraded under pressure
- Inconsistent standards across teams
- No systematic knowledge capture
Platform Vision
Blaze is a governance and orchestration layer that sits above all AI coding platforms, providing a unified agent framework, evidence collection, and compliance enforcement regardless of which tool your engineers use. Blaze is available as a local installation for existing environments and as a fully managed cloud platform — where developers connect to Kubernetes-hosted ephemeral containers with Claude Code and the full governance stack pre-installed.
Key Differentiators
Dual-Platform
Define artifacts once in canonical format; publish to OpenCode and Claude Code automatically. All 78 agents available on both platforms today.
Evidence-First
Every agent action is captured as structured evidence, satisfying SOC 2, ISO 27001, and custom compliance frameworks.
Multi-Tenant Isolation
Schema-per-tenant PostgreSQL with row-level security. Each customer's data is cryptographically separated.
78 Specialized Agents
A complete SDLC agent portfolio covering design through deployment, pre-built and ready to customize.
CDD Framework
Compliance-Driven Development chains requirements through code to evidence automatically.
Cost-Optimized Routing
Intelligent model routing (Haiku/Sonnet/Opus) saves 60-70% on LLM costs without sacrificing quality.
Developer Journey — From Terminal to Compliance
A developer starts a governed session from their terminal. From that point, Blaze handles governance, testing, review, and compliance evidence automatically. Here is the end-to-end flow:
on Every Commit
Zero manual overhead. Developers write code in their terminal. Everything else — testing, security scanning, multi-model review, evidence collection, compliance reporting — happens automatically in the background.
What Changes With Blaze
A side-by-side comparison of development before and after adopting Blaze:
| Area | Without Blaze | With Blaze |
|---|---|---|
| Governance | Manual code reviews, tribal knowledge, inconsistent standards | 78 AI agents enforce standards automatically on every commit |
| Compliance | Spreadsheets assembled after the fact for auditors | Evidence collected in real-time at every phase gate |
| Consistency | Every developer configures their own tools differently | Governed artifacts — same rules, hooks, and agents for everyone |
| Speed | Days from code complete to merge (manual reviews, back-and-forth) | Minutes — AI handles testing, review, and documentation |
| Audit Trail | “We think we checked that” — no verifiable proof | SHA-256 hashed evidence chain, every action traceable |
| Multi-Tenant | One-off setups per customer, no isolation guarantees | Deploy isolated instances in one command with full data separation |
Blaze turns AI-assisted development from a wild west into a governed, auditable, repeatable process — without slowing developers down.
Architecture Overview
Blaze uses a hub-and-spoke architecture centered on a Governance MCP Server, with tenant isolation enforced at every layer from the API gateway through to storage.
API Gateway
Tenant-aware routing with JWT validation. Every request carries tenant context through the full call chain.
MCP Protocol
Model Context Protocol enables bidirectional tool communication between agents and the governance server.
Event Sourcing
All agent actions are persisted as immutable events, enabling full audit replay and compliance reporting.
Cloud Platform Architecture
Blaze runs as a managed Kubernetes platform where developers connect to ephemeral containers pre-loaded with Claude Code and the full SDLC governance stack.
Falco Runtime
OPA/Gatekeeper
Network Policies
Ephemeral Dev Environments
Developers connect via web terminal or SSH to pods with Claude Code and Blaze pre-installed. Environments spin up in under 60 seconds, fully configured for the project.
State Persistence
Memory bank, evidence, and session state are stored in GCS/S3 and automatically restored on container start. No work is lost between sessions.
BlazeEnvironment CRD
Declarative environment lifecycle managed by a Kubernetes operator. OpenAPI-validated custom resource definition controls provisioning, scaling, and teardown.
Canonical Artifact Registry
All platform artifacts are defined once in blaze/canonical/ and automatically published to OpenCode and Claude Code via publish-artifacts.sh. Frontmatter transformations adapt each artifact to its target platform format. A PostToolUse hook auto-publishes on edit; a pre-commit hook auto-stages generated files — zero manual steps.
Canonical Format (Markdown + YAML Frontmatter)
Transformation Rules
| Artifact | To OpenCode | To Claude Code |
|---|---|---|
| Agent | Full frontmatter (strip targets:) | Description-only frontmatter |
| Command | Keep agent:, subtask: | Keep description: only |
| Skill | skill-name/skill.md | skill-name/index.md |
| Rule | blaze/rules/ | .claude/rules/ |
| Mode/Schema/Plugin | Direct copy | N/A |
Publisher Flow
Full frontmatter + body
Minimal frontmatter + body
Zero-Touch Automation
Write or Edit to blaze/canonical/* triggers publish-artifacts.sh --generate automatically via Claude Code hook (~2s).
Git pre-commit hook detects canonical changes, auto-runs generation, and re-stages all target files. Commit includes both source and output.
Direct edits to .opencode/ or .claude/ without canonical changes are blocked. Emergency bypass via SKIP_CANONICAL_CHECK=1.
Agent Portfolio — 78 Agents
A complete SDLC coverage across four phases plus cross-cutting concerns. All 78 agents run on both OpenCode and Claude Code. Artifacts are defined in blaze/canonical/ and auto-published to both .opencode/ and .claude/ via the canonical artifact registry.
Platform Components
Beyond agents, Blaze comprises skills, rules, hooks, and scripts that form the backbone of governed AI development. Click any card for full details.
BPMN Capabilities
Enterprise-grade BPMN 2.0 process modeling with validation for both Camunda 7 and Camunda 8 platforms, plus battle-tested best practices for visual clarity and maintainability.
Compatibility Validation
Ensures BPMN diagrams are fully compatible with Camunda 7 engine requirements.
historyTimeToLiveattribute enforcement on all process definitionscandidateGroups/candidateUsersassignment validationformDataand embedded form reference checking- Execution listener and task listener syntax validation
- Timer definition expression format verification
External Task Pattern
Validates proper use of the external task pattern for distributed work processing.
- Topic name uniqueness across process definitions
- Error handling boundary events on external tasks
- Retry configuration (
retries,retryTimeCycle) - Input/output variable mapping completeness
DMN Decision Tables
Validates decision tables for completeness and engine compatibility.
- Hit policy validation (UNIQUE, FIRST, COLLECT, etc.)
- Input/output column type consistency
- Missing rule detection and gap analysis
- Business rule task ↔ decision table linkage
Error Detection
Flags common pitfalls and incompatible configurations.
- Zeebe namespace detection (flags
zeebe:elements as Camunda 8-only) - Deprecated API usage warnings
- Missing end events and dangling sequence flows
- Overlapping boundary events on the same activity
- Invalid expression language references
Zeebe-Native Validation
Full validation against Camunda 8's Zeebe workflow engine requirements.
- Zeebe task definition type validation
- Message correlation key expression checking
- Signal event reference validation
- Multi-instance configuration completeness
- Process instance variable scope validation
Cloud Connector Support
Validates Camunda 8 connector configurations for cloud service integrations.
- REST connector URL and method validation
- SendGrid / Slack connector parameter checking
- Custom connector template compatibility
- Secret reference resolution (
secrets.*)
Job Worker Patterns
Best practices for job worker implementation and error handling.
- Worker type naming convention enforcement
- Timeout configuration validation
- Error code mapping between process and workers
- Variable fetching optimization (fetchVariables)
Operate & Tasklist Integration
Validates configurations that affect Operate monitoring and Tasklist user experience.
- User task form key / form ID validation
- Task assignment expression completeness
- Process annotation for Operate dashboards
- Incident resolution path verification
1 Task Dimensions
Standard task elements should be 151×76 pixels. Consistent sizing ensures visual harmony and prevents crowded diagrams.
2 Pool & Lane Sizing
Pools should be wide enough for the full flow. Lanes need minimum 150px height per element row. Expand containers rather than cramming elements.
3 Escalation Pattern
Use timer boundary events for escalation. Escalation targets must be in the same lane or an adjacent lane — never skip lanes.
4 Text Annotations
Keep subprocess names clean and descriptive. Use text annotations for supplementary context rather than cluttering element labels.
5 Convergence Gateway
Always place a converging gateway before a subprocess to ensure all incoming flows are properly synchronized.
6 Multiple BPMNDiagram Support
Use multiple BPMNDiagram elements for drill-down views. Main diagram shows collapsed subprocesses; secondary diagrams show expanded detail.
7 Parallel Agent Orchestration
Use parallel gateways for concurrent agent execution. Always pair split gateways with join gateways for clean synchronization.
8 Camunda Modeler Metadata
Preserve Camunda Modeler export metadata. The exporterVersion ensures compatibility when re-opening in the modeler.
9 Layout Rules
Flow direction is left-to-right. Minimum lane height is 150px. Maintain 40px minimum spacing between elements. Align elements to grid.
10 Validation Tooling
Use Blaze's built-in BPMN validation tools before committing diagrams. Supports both CLI and CI/CD pipeline integration.
Platform Support Matrix
Blaze supports two platform tiers based on API surface. Each tier provides real-time governance and evidence collection through different mechanisms.
| Capability | OpenCode (Full Platform) | Claude Code (Enhanced) |
|---|---|---|
| Agent Execution | ✓ Full subagent support | ✓ Full subagent support |
| Real-time Governance | ✓ Plugins + hooks | ✓ Hooks |
| Evidence Collection | ✓ Real-time via plugin | ✓ Via MCP tools |
| MCP Support | ✓ Full MCP server | ✓ MCP client |
| Plugin System | ✓ TypeScript plugins | ✗ No plugin API |
| Slash Commands | ✓ Custom commands | ✓ /commands |
| Memory Bank | ✓ Cross-session | ✓ CLAUDE.md + auto memory |
| CI/CD Integration | ✓ Native + hooks | ✓ Via GitHub Actions |
| Modes/Personas | ✓ Named modes | ◐ Prompt-based |
Maximum Governance Coverage
Real-time enforcement via TypeScript plugins, MCP server integration, event-driven evidence capture, custom commands, and named modes.
Strong Governance Coverage
Governance via MCP tools, hooks, and agents. Covers all SDLC phases effectively with subagent orchestration and slash commands.
Multi-Tenant Architecture
Blaze isolates every tenant at every layer of the stack. No data leakage between customers is possible by design, not by policy.
5-Level Isolation Hierarchy
| Level | K8s Primitive | Isolation Type |
|---|---|---|
| Platform Operator | Cluster | Infrastructure ownership |
| Organization | Cluster or ns | Hard network/resource isolation |
| Tenant | Namespace | RBAC, network policies, resource quotas |
| Project | Namespace | Full namespace isolation |
| Developer | Pod(s) | Ephemeral; state stored externally |
- Schema-per-tenant PostgreSQL with RLS policies
- Namespace-per-tenant Kubernetes workloads
- Tenant-scoped S3 prefixes with IAM isolation
- JWT claims carry tenant_id through all services
- Audit logs are tenant-isolated and immutable
Tenant Onboarding Flow
Provision Org
Create organization record, allocate dedicated cluster or namespace, configure billing
Create Tenant Namespace
Generate tenant_id, allocate K8s namespace with RBAC, network policies, and resource quotas
Configure Project
Create project namespace, link to git repo, configure feature flags and agent set
Spin Up Dev Environment
Apply BlazeEnvironment CRD, run init containers, connect developer via web terminal or SSH
Activate Governance
Enable enforcement rules, configure compliance framework, begin evidence collection
Tenant Data Model
Solution Registry & Multi-Tenant Deployment
Blaze is a platform for building and deploying AI-powered solutions. Solutions like KM Flow and SLA are registered in the catalog, then deployed as fully isolated instances per organization and customer.
Solution Catalog
Registered solutions are versioned products that can be instantiated per customer engagement.
| Solution | Description | Status |
|---|---|---|
| KM Flow | AI-powered knowledge management workflow | active |
| SLA | Software Lifecycle Automation | active |
Instance Hierarchy
Deployment Flow
1. Register Solution
blaze-solution.sh register --name kmflow --repo /repos/kmflow
2. Deploy Instance
blaze-deploy.sh kmflow --org blazeco --customer acme --version v1.0
3. Provision Infrastructure
K8s namespace + RBAC + NetworkPolicy + ResourceQuota + Deployment with init container
4. Configure Access
Cloudflare subdomain + OTP auth scoped to org email domains
5. Manage Lifecycle
blaze-instance.sh upgrade | snapshot | teardown | rollback | cost
Per-Instance Isolation
| Layer | Isolation |
|---|---|
| K8s Namespace | sol-{org}--{solution}--{customer} |
| Network | Default-deny + explicit allow (CF tunnel, governance, DNS) |
| RBAC | Org-scoped ServiceAccount + RoleBinding |
| Database | Dedicated PostgreSQL per instance |
| Storage | Dedicated PersistentVolume |
| Subdomain | {customer}-{solution}.accelerator-demo.com |
| AI Artifacts | Governed via Governance Service cascade |
| Cost | K8s labels for per-instance attribution |
Managed Developer Environments
Blaze Cloud provides Kubernetes-hosted ephemeral developer environments with Claude Code and the full SDLC governance stack pre-installed. Developers connect via web terminal or SSH — no local setup required.
Init Container Pipeline
Every developer pod is assembled by a sequence of three init containers that run before the main Claude Code container starts.
init-config
Assembles .claude/ directory with feature-flag-filtered agents, rules, and skills for this project
init-repo
Clones the project repository with scoped credentials and configures git identity for the developer
init-state
Restores memory bank and CDD evidence from cloud storage (GCS/S3) so context is available from the first prompt
Control Plane Services
Platform API
REST API for Org, Tenant, Project, and User CRUD operations. Manages the full environment lifecycle: create, suspend, resume, and delete environments. All mutations are JWT-authenticated and tenant-scoped.
Config Sync
Push-based configuration update queue. When platform-level agent definitions change, Config Sync notifies running pods and triggers a reload. Emergency sentinel mechanism enables immediate policy enforcement across all active sessions.
State Manager
Handles save, restore, and cleanup of ephemeral container state. On pod termination, the state manager snapshots the memory bank and evidence directory to cloud storage. On pod start, it restores from the latest snapshot.
Environment Controller
Kubernetes operator that watches BlazeEnvironment custom resources and reconciles the desired state. Manages pod lifecycle, resource quotas, and CRD validation against the OpenAPI schema.
Access Gateway
Web Terminal
Browser-based terminal via ttyd exposed through Kubernetes ingress over WebSocket. No local client installation required. Works in any modern browser with full PTY support.
- WebSocket tunnel through ingress controller
- SSO-authenticated via tenant IdP (OAuth/SAML)
- Session recording for compliance audit trail
- Clipboard integration and custom font rendering
SSH Access
Native SSH access via a bastion proxy with SSO certificate authentication. Developers use their existing SSH client and their normal workflow tools against the governed environment.
- SSO certificate authority issues short-lived certs
- Bastion proxy enforces tenant isolation
- Port forwarding enabled for local tool access
- Audit log for every SSH session
Security Stack
Defense-in-depth across five security layers, from pod admission through runtime monitoring.
Pod Security Standards
All developer pods run under the Restricted Pod Security Standard profile — the most locked-down Kubernetes security posture. No privilege escalation, read-only root filesystem, dropped all capabilities.
Falco Runtime Monitoring
7 custom Falco rules monitor for anomalous behavior inside developer pods: unexpected outbound connections, credential file access, shell spawning in unexpected contexts, and container escape attempts.
OPA/Gatekeeper Admission Control
Open Policy Agent constraints validate every Kubernetes object at admission time. Three constraint sets: namespace labels (required org/tenant/project labels), pod constraints (no privileged, image registry allowlist), and secret constraints (Sealed Secrets only).
Network Policies & Sealed Secrets
Default-deny network policies with explicit allow rules for required egress (git, registry, LLM API). Secrets are managed as Sealed Secrets — encrypted with a cluster-specific key, safe to commit to git, decrypted only inside the cluster.
Observability Stack
Prometheus
6 scrape jobs covering the API server, environment controller, node exporter, Falco, and Claude Code metrics endpoints. Blaze label relabeling adds org, tenant, project, and user dimensions to every metric.
Grafana Dashboards
4 pre-built dashboards: Platform Overview (cluster health, pod counts, API latency), Session Activity (active sessions, token usage, costs), Compliance Score Trends, and Resource Utilization by tenant.
Loki Log Aggregation
Structured log collection from all containers via the Loki Kubernetes operator. Logs are indexed by org, tenant, project, and user labels enabling fast cross-tenant log queries without data leakage.
OpenTelemetry
Distributed traces, metrics, and logs with org/tenant/project/user resource attributes on every span. The OTel collector fans out to Prometheus (metrics), Loki (logs), and Jaeger (traces).
Alerting Rules
9 alerting rules covering: compliance score drop below threshold, security policy violations, API latency spikes, pod OOM events, Falco rule triggers, certificate expiry, and storage quota approaching 80%.
8-Phase Cloud Infrastructure Rollout
Base Container Image
- Claude Code runtime base image
- Blaze platform pre-installed
- Non-root user, read-only filesystem
- OCI-compliant image scanning
Init Container System
- init-config: agent assembly
- init-repo: repo cloning
- init-state: state restoration
- Parallel init with readiness gates
K8s Manifests
- BlazeEnvironment CRD with OpenAPI validation
- RBAC roles and bindings
- Network policies (default deny)
- Resource quotas per project
Access Gateway
- ttyd web terminal deployment
- SSH bastion proxy
- SSO certificate authority
- Ingress rules and TLS
Control Plane Services
- Platform API (Go/FastAPI)
- Config Sync service
- State Manager
- Environment Controller operator
Observability Stack
- Prometheus + 6 scrape jobs
- Grafana + 4 dashboards
- Loki log aggregation
- OTel collector pipeline
State Management
- GCS/S3 snapshot integration
- Save/restore lifecycle hooks
- Evidence directory sync
- Memory bank persistence
Security & Compliance
- Falco with 7 custom rules
- OPA/Gatekeeper constraints
- Sealed Secrets integration
- 9 alerting rules activated
Security & Compliance
Enterprise-grade security architecture designed for SOC 2 Type II certification, with defense-in-depth across authentication, authorization, encryption, and audit.
Authentication & Identity
JWT-based authentication with short-lived tokens (15min access, 7-day refresh). Supports OIDC federation with enterprise IdPs (Okta, Azure AD, Google Workspace).
- PKCE OAuth 2.0 flow
- MFA enforcement per tenant policy
- API key rotation with zero-downtime
- Service account scoping
Authorization & RBAC
Role-based access control with hierarchical permissions. Roles are tenant-scoped and cannot cross tenant boundaries even for platform administrators.
- Owner / Admin / Developer / Viewer roles
- Resource-level permissions (agent, evidence, report)
- Attribute-based access for sensitive data
- Audit log for all permission changes
Encryption
Data encrypted at rest with AES-256-GCM. Transit encryption via TLS 1.3 minimum. Customer-managed encryption key (CMEK) support for Enterprise tier.
- PostgreSQL transparent data encryption
- S3 SSE-S3 / SSE-KMS per bucket
- Secrets managed via HashiCorp Vault
- Key rotation on 90-day schedule
Audit & Compliance
Immutable audit trail for every action across the platform. Audit records cannot be deleted or modified, satisfying SOC 2 CC7 and ISO 27001 A.12.4 controls.
- SOC 2 Type II path (12-month audit window)
- ISO 27001 control mapping available
- GDPR data residency options (EU deployment)
- PCI-DSS cardholder data exclusion by design
MCP Security Scanner
60+ regex patterns from 6 open-source scanners (Cisco YARA, AgentSeal, mcp-shield, Pipelock, AgentShield, guard-scanner) scan MCP tool descriptions for prompt injection, tool poisoning, credential harvesting, and data exfiltration.
- 9-layer deobfuscation (zero-width chars, base64, leetspeak, bidi controls, Unicode normalization)
- 17 prompt injection patterns (instruction override, role assignment, jailbreak commands)
- Tool poisoning & shadowing detection (hidden actions, concealment directives)
- Credential harvesting (API keys, JWTs, private keys, env var secrets)
- Suspicious parameter name scanning (exfiltration channels, hidden instructions)
Context Budget Estimator
Token-level visibility into what Claude Code loads at session start. Estimates context window consumption from CLAUDE.md files, rules, skills, MCP schemas, and system overhead.
- Classifies items as always-loaded vs deferred (ToolSearch)
- Detects on-demand rules via
paths:frontmatter analysis - MCP server token estimation (~3,100 tokens per unique server)
- MEMORY.md truncation modeling (200 lines / 25KB cap)
- System overhead constants calibrated to Claude Code v2.1.84
Data Architecture
A purpose-built polyglot persistence layer combining relational integrity, graph relationships, time-series analytics, and cost-tiered object storage.
PostgreSQL + Apache AGE
Primary data store with graph extension for relationship traversal. AGE enables Cypher queries over requirement→evidence→artifact graphs without a separate graph database.
- Apache AGE graph extension
- Cypher query support
- Full ACID transactions
- JSON/JSONB for flexible schemas
S3 Evidence Storage
Three-tier intelligent tiering for cost-optimized evidence retention. Evidence moves automatically based on age and access frequency.
- Standard: 0-30 days ($0.023/GB)
- Standard-IA: 31-90 days ($0.0125/GB)
- Glacier: 90+ days ($0.004/GB)
- Lifecycle policies automated per tenant
TimescaleDB Metrics
Time-series extension for agent performance metrics, compliance score trends, and cost analytics. Continuous aggregates for dashboard performance.
- Hypertable auto-partitioning
- Continuous aggregate views
- Data retention policies
- Grafana integration
Core Schema Tables
Evidence
WorkItem
Requirement
Decision
Pattern
Violation
Evidence & Compliance-Driven Development
CDD establishes an unbroken chain from business requirement through implementation to verified evidence, enabling automated compliance demonstration.
The CDD Evidence Chain
Requirement
Tagged with control framework ref (SOC2-CC6.1)
Design Decision
ADR created with rationale and alternatives
Implementation
Code changes linked to requirement ID in commits
Verification
Tests executed, screenshots captured as evidence
Evidence Record
Immutable S3 artifact with full chain of custody
Test-Driven Development
TDD ensures executable specifications precede implementation. Blaze's test-coverage-analyzer and playwright-e2e-tester capture test results as structured evidence linked to requirements.
Behavior-Driven Development
BDD scenarios written in Gherkin provide human-readable specifications that double as compliance evidence. Scenario outcomes are captured with screenshots and execution logs.
Compliance-Driven Development
CDD extends TDD/BDD with explicit control mapping. Every requirement is tagged to a control framework, and evidence collection is mandatory before phase transitions are permitted.
Evidence Lifecycle
Collection
Agents invoke mcp_evidence_capture with typed payloads. Evidence schema version is recorded for forward compatibility. All metadata (agent, phase, tenant, timestamp) is automatically attached.
Storage
Evidence written atomically to PostgreSQL (metadata + searchable fields) and S3 (full payload). Checksums verified on write. Intelligent tiering moves cold evidence to Glacier automatically.
Querying
Compliance managers can query evidence by requirement ID, control framework, date range, agent, or phase. Apache AGE enables graph traversal: "show all evidence linked to SOC2-CC6.1".
Reporting
The compliance-manager agent generates formatted audit packages: evidence index, control mapping matrix, coverage percentages, and gap analysis. Exportable as PDF or structured JSON.
Developer Experience
Blaze is designed for zero-friction adoption. Developers interact with familiar tools while governance happens transparently in the background.
Zero-Infrastructure Onboarding
A single CLI command installs Blaze agents into any supported platform. No local servers, no Docker, no configuration files to maintain.
Context-Triggered Agents
Agents activate automatically based on file context and SDLC phase. No manual invocation needed for routine governance checks.
- Open a
*.tffile → architecture-reviewer activates - Edit auth code → security-reviewer triggers automatically
- Create PR → pr-orchestrator begins evidence collection
- Phase gate reached → compliance-manager generates report
- Dependency added → dependency-checker scans CVEs
- Test processes pile up → process watchdog auto-kills runaways
Memory Bank
Cross-session institutional memory. Agents learn your codebase, team conventions, and past decisions. Context persists across sessions and is shared across the team.
- Architectural patterns extracted and stored
- Past ADRs available to all agents
- Team conventions encoded from code review feedback
- Cross-session context eliminates repetitive setup
Instant Setup
Under 5 minutes from install to first evidence captured
Transparent
See exactly what each agent checks and why in real-time
Context-Aware
Agents understand your codebase, not just generic rules
Resource Protection
Watchdog prevents runaway AI subprocesses from consuming system resources
Ecosystem Integration
Blaze connects to the tools your teams already use. No workflow changes required — governance wraps your existing process.
Project Management
CI/CD Pipelines
Source Control
AI Coding Platforms
Security & Compliance
Observability
MCP Protocol
Model Context Protocol is the integration backbone. Blaze exposes a governance MCP server that any MCP-compatible client can connect to, enabling tool discovery, invocation, and result streaming without custom integrations.
AI SDLC Compliance & Orchestration
Blaze operates in the emerging AI SDLC governance space — not AI coding assistants. The distinction matters: coding assistants generate code, Blaze governs the entire AI-assisted development lifecycle. Every tool below that writes code is a tool Blaze sits on top of.
Direct Competitors
Platforms competing in AI SDLC governance and orchestration.
| Platform | Funding | Governance | Multi-Agent | Evidence / Audit | Multi-Platform | SDLC Coverage | Compliance |
|---|---|---|---|---|---|---|---|
| Blaze | Startup | ✓ | ✓ 78 agents (both platforms) | ✓ Neo4j graph | ✓ OpenCode + Claude Code | ✓ Full 4-phase | ✓ CDD + EU AI Act |
| Blitzy | $4.4M seed | ● SOC 2 / ISO | ✓ 3000+ agents | ● | ✗ Own platform | ✓ Full lifecycle | ✓ SOC 2 / ISO 27001 |
| Factory | $70M raised | ● | ✓ | ● | ✗ Own platform | ● | ✓ SOC 2 / ISO |
| GitLab Duo | Public | ● | ● | ● | ✗ GitLab only | ✓ Full lifecycle | ● |
| Qodo | Multi-agent | ● | ✓ | ✗ | ● | ✗ Reviews only | ✗ |
✓ Full support ● Partial ✗ None / minimal
Complementary Tools Blaze Governs
These AI coding tools generate code — Blaze adds the governance layer on top.
| Tool | What It Does | Blaze Integration |
|---|---|---|
| GitHub Copilot | Code completion & PR assistance | Governs via MCP, evidence capture |
| Cognition (Devin) | Autonomous coding agent | Governance overlay planned |
| Amazon Q Developer | AWS code assistant | Evidence capture via MCP |
| Tabnine | Privacy-first completion | Compatible governance layer |
| Claude Code / OpenCode | Terminal AI assistants | Native support (both platforms) |
Governance Across AI Coding Platforms
Blitzy, Factory, and GitLab Duo build governance into their own closed platforms. Qodo covers only code reviews. Blaze governs across OpenCode and Claude Code today, with a canonical artifact registry designed to extend to any future MCP-compatible agent — without requiring developers to switch tools.
Where Blaze Leads
CDD Methodology
No competitor has a structured Compliance-Driven Development methodology with evidence gates at every SDLC phase.
Agent Transpilation
Canonical artifact registry publishes definitions across platforms — define once, auto-publish to OpenCode and Claude Code. All 78 agents plus commands, skills, and rules managed from single source of truth.
PM-Tool Agnostic
Enforces governance across Jira, Azure DevOps, GitHub Issues, and Linear. No vendor lock-in on project management.
Knowledge Graph
Neo4j evidence graph enables compliance queries across the entire development history — not just flat log files.
9+ Review Agents
Specialized depth across security, architecture, compliance, performance, dependencies, design, and code quality.
Multi-Model Consensus
Cross-model review (Claude + GPT-4 + Gemini) prevents single-LLM blind spots with configurable agreement thresholds.
Market Positioning
Market Gaps & Revenue Priorities
The AI coding market is growing fast, but critical enterprise capabilities remain unaddressed. These gaps represent Blaze's strategic opportunity.
Capability Gaps in the Market
| Capability Gap | Market Maturity | Competitors Addressing | Blaze Status |
|---|---|---|---|
| TRiSM Framework Alignment | Nascent | 0 | Designed In |
| EU AI Act Compliance | Nascent | 0 | Evidence Ready |
| GRC Platform Integration | Non-existent | 0 | Roadmap |
| Agent Marketplace | Nascent | 0 | Roadmap |
| AI Developer Metrics | Early | 1–2 | In Progress |
| Self-Service Compliance Portal | Low | 0 | Roadmap |
Table Stakes vs. True Differentiators
Table Stakes (Everyone Has These)
- Code completion & inline suggestions
- Chat-based coding assistance
- IDE integration (VS Code, JetBrains)
- Basic security scanning (SAST)
- Context-aware code generation
- Multi-language support
True Differentiators (Where Blaze Leads)
- Dual-platform governance overlay (OpenCode + Claude Code)
- Structured evidence capture at every phase
- Multi-model consensus reviews
- Compliance-Driven Development methodology
- Agent publishing across platforms (canonical registry)
- Knowledge graph for audit queries
Revenue Impact Priorities
Ordered by estimated enterprise demand and competitive moat potential.
- Enterprise governance dashboard with board-level reporting and risk scoring
- Compliance evidence automation with SOC 2 / ISO 27001 / EU AI Act control mapping
- Multi-model orchestration with intelligent cost routing (already built)
- GRC platform integration — ServiceNow GRC, OneTrust, Archer connectors
- Developer productivity analytics — DORA + SPACE + AI-specific metrics
- Agent marketplace for SDLC-specific agents with governance pre-certification
Change Management & 90-Day Rollout
A phased adoption approach minimizes disruption while building organizational capability. Each phase has defined KPIs and success criteria before advancing.
Install & Observe
Deploy Blaze in observation mode. No enforcement. Gather baseline metrics and identify high-value governance opportunities.
- Install agents on pilot team (3-5 devs)
- Configure platform connections (GitHub, Jira)
- Run agents in report-only mode
- Review first evidence dashboard
- Identify top 5 governance gaps
- Train team on CDD concepts
Enable & Enforce
Activate enforcement for security and quality agents. Integrate with PR workflow. Begin evidence collection for compliance reporting.
- Enable blocking security-reviewer checks
- Activate PR governance via pr-orchestrator
- Link requirements to work items
- First compliance report generated
- Expand to 10-15 developers
- Configure custom governance rules
Expand & Optimize
Full team rollout. Enable all SDLC phase governance. Optimize model routing for cost. Prepare first SOC 2 evidence package.
- Roll out to entire engineering org
- Enable all 78 agents across OpenCode and Claude Code
- Tune model routing for cost optimization
- Generate SOC 2 readiness report
- Establish governance KPI dashboard
- Plan agent customization roadmap
Adoption KPIs
by Day 60
by Day 90
via routing
time target
Migration Roadmap — 8 Weeks
A structured 8-week technical delivery plan covering all platform components. Weeks overlap to maintain momentum while managing dependencies.
Weeks 1-2: Foundation
Canonical artifact registry implemented with publish-artifacts.sh pipeline. 174 artifacts (78 agents, 24 commands, 18 skills, 40 rules, 5 modes, 4 schemas, 3 plugins, 2 workflows) managed from single source of truth with zero-touch automation.
Weeks 2-5: Core Services
JWT auth, RBAC, MCP server with all tools, tenant provisioning API, PostgreSQL schema migrations with RLS.
Weeks 4-7: Data & Agents
Evidence pipeline, S3 tiering, TimescaleDB, all 78 agent artifacts deployed to target platforms, CLI tooling.
Week 8: Launch
Presentation layer, documentation, design partner onboarding, final security review, go-live checklist.
Cloud Infrastructure Phases
8-phase delivery plan for the Kubernetes-based managed developer environment platform. Each phase is independently deployable and testable.
Base Container Image
- Claude Code + Blaze runtime base image
- Non-root, read-only filesystem configuration
- OCI-compliant image built in CI
- Vulnerability scanning gate
Init Container System
- init-config, init-repo, init-state containers
- Feature-flag-based agent filtering
- Credential injection via Sealed Secrets
- Parallel init with readiness probes
K8s Manifests
- BlazeEnvironment CRD with OpenAPI schema
- RBAC roles, bindings, service accounts
- Default-deny network policies
- Resource quotas and LimitRanges
Access Gateway
- ttyd web terminal via ingress
- SSH bastion proxy deployment
- SSO certificate authority setup
- OAuth/SAML tenant IdP integration
Control Plane Services
- Platform API for environment lifecycle
- Config Sync push queue service
- State Manager save/restore service
- Environment Controller K8s operator
Observability Stack
- Prometheus with 6 scrape jobs
- Grafana with 4 dashboards
- Loki log aggregation
- OTel collector + 9 alert rules
State Management
- GCS/S3 snapshot lifecycle
- Memory bank persistence hooks
- Evidence directory sync
- Cross-session context restoration
Security & Compliance
- Pod Security Standards (Restricted)
- Falco with 7 custom runtime rules
- OPA/Gatekeeper admission constraints
- Sealed Secrets cluster integration
Risk Analysis
Identified risks are categorized by domain, assessed for likelihood and impact, and paired with concrete mitigations. Click any card to expand details.
Technical Risks
MCP is a rapidly evolving protocol. Breaking changes in the spec could require significant rework of the governance server and client integrations.
Likelihood: Medium | Impact: High
Apache AGE graph queries over large evidence datasets may degrade as tenants accumulate months of data. Cypher query planning in AGE is less mature than dedicated graph databases.
Likelihood: Medium | Impact: Medium
AI coding platforms are evolving rapidly. OpenCode or Claude Code may change their plugin/hook APIs in ways that break existing Blaze integrations.
Likelihood: High | Impact: Medium
Business Risks
Enterprise procurement cycles are long (6-18 months). Security review, legal, and procurement gates can delay revenue even after a technical win. Developer tooling budgets may require executive sponsorship.
Likelihood: High | Impact: High
If OpenCode or Claude Code achieves dominant market share and builds native governance features, the multi-platform value proposition weakens. Anthropic could build a competitive governance layer natively.
Likelihood: Low | Impact: High
Security Risks
A bug in RLS policies or tenant context propagation could expose one tenant's evidence data to another tenant's queries. This would be a catastrophic trust and legal violation.
Likelihood: Low | Impact: Critical
Agents reading code files or PR descriptions could encounter adversarially crafted content designed to manipulate agent behavior or exfiltrate tenant context.
Likelihood: Medium | Impact: High
Operational Risks
Without usage caps, aggressive agent invocation (especially Opus-routed tasks) could generate LLM costs that exceed subscription revenue. Misconfigured routing could send all traffic to expensive models.
Likelihood: Medium | Impact: High
High-frequency evidence collection across many tenants generates substantial S3 storage. Without lifecycle management, storage costs could grow unboundedly. Large evidence payloads could also slow query performance.
Likelihood: Medium | Impact: Low
Project Stats & Health
Live metrics from the Blaze monorepo as of March 24, 2026. All figures are derived from git history, CI pipelines, and coverage reports.
Codebase Composition
Source Files
| Python (.py) | 51 |
| JavaScript (.js) | 91 |
| TypeScript (.ts) | 31 |
| HTML presentations | 17 |
| Markdown docs | 538 |
| YAML configs | 74 |
Platform Components
| AI agents | 78 |
| Hooks (JS + Shell) | 21 |
| Scripts (JS + Shell) | 51 |
| Instruction files | 50 |
| Rule files | 33 |
| Config files | 24 |
Infrastructure
| Cloudflare Workers | 7 |
| K8s manifest dirs | 8 |
| Terraform modules | EKS |
| Compliance frameworks | 4 |
| ADRs | 4 |
| BDD feature files | 2 |
Test Coverage
Python Enforcement Engine 99%
369 tests across 6 modules. Merkle tree integrity, compliance scoring, prompt injection scanning, health score normalization, workflow validation, and industry-specific rule engine.
compliance-monitor.py | 98% |
evidence-generator.py | 97% |
workflow-validator.py | 97% |
industry_rule_engine.py | 100% |
health-score.py | 99% |
prompt-injection-scanner.py | 99% |
JavaScript Scripts & Hooks 95.4%
1,038 tests across 27 suites. Attestation verification, immutable storage, cost tracking, release notes, PR review gate, dashboard aggregation, checkbox orchestration, and PM tool integrations.
| Statements | 95.4% |
| Branches | 86.2% |
| Functions | 96.3% |
| Lines | 96.3% |
| Test suites | 27 / 27 pass |
| Skipped tests | 31 (infra-dependent) |
Development Timeline
| Metric | Value |
|---|---|
| First commit | March 4, 2026 |
| Latest commit | March 21, 2026 |
| Development duration | 17 days |
| Total commits | 75 |
| Pull requests merged | 42 |
| Commits per day (avg) | 4.4 |
| Lines of code (Py + JS + TS) | 62,717 |
| Total files in repo | 802 |
Compliance & Security
Regulatory Frameworks
4-dimensional compliance scoring: controls coverage, evidence freshness, severity-weighted effectiveness, and remediation speed. Merkle tree integrity validation with SHA-256 hash chains.
Security Features
| MCP security scanner | 60+ patterns |
| Deobfuscation layers | 9 techniques |
| OTP auth workers | 7 workers |
| Enforcement modules | 6 modules |
| Context budget estimator | token visibility |
| Evidence types | 4 types |
| Blaze Health Score | 0-10 scale |
AI Agent Hierarchy
Primary Agents
2Tab-switchable orchestrators: sdlc and review. Entry points for all SDLC workflows.
Visible Agents
10Invoked via @agent-name: critical-thinking, codebase-mapper, hypothesis-reasoning, and 7 more.
Hidden Agents
66Internal agents called by orchestrators. Security reviewers, compliance managers, deployment specialists, and domain experts.
Changelog
Platform evolution from initial launch through current state. All changes ship to both OpenCode and Claude Code runtimes via automated agent sync.
Week 6 — Security Hardening & Tooling
March 28, 2026Added
- MCP Security Scanner — 60+ patterns from 6 open-source scanners with 9-layer deobfuscation (cherry-picked from claude-code-organizer)
- Context Budget Estimator — token-level visibility into Claude Code context window consumption
/context-budgetskill for on-demand budget analysis- ADR-004: Cherry-pick evaluation — rejected full integration of claude-code-organizer, extracted 2 capabilities
- 138 new tests (93 security scanner + 45 context budget) — 100% line coverage on scanner, 99% on budget
Changed
- Security Features table updated: 6 patterns → 60+ MCP security patterns
- Security section expanded with MCP Scanner and Context Budget cards
- Comprehensive audit batches 10–18: auth codes, TLS, CORS, GDPR, seccomp, type assertions, nullish coalescing
Security
- 3-agent parallel evaluation of external packages before integration (security, architecture, dependency)
- Zero new dependencies added — all extracted code is pure JavaScript with Node builtins only
Week 5 — Solution Registry & Governance
March 24, 2026Added
- Solution Registry — register, deploy, and manage Blaze-powered solutions as multi-tenant products #176
- 3 CLI scripts:
blaze-solution.sh,blaze-deploy.sh,blaze-instance.sh(1,400+ lines) #176 - 5 K8s manifest templates for solution instance namespaces #176
- Artifact Governance Service — FastAPI with 4-level cascade resolution, 15 API endpoints #173
- Solution & Instance ORM models, Pydantic schemas, manifest validation #173
- PRD v4.0 with Solution Registry user stories US-17–US-22 and BDD scenarios
- 103 new tests (76 Python + 27 JavaScript) #173, #176
Changed
- PRD upgraded v3.0 → v4.0: Solution Registry as third platform pillar
- Governance API router extended with solutions + instances endpoints
Fixed
- Version string injection in CLI scripts #176
- JSON injection via --description in solution update #176
- Ambiguous FK on Scope.artifacts relationship #175
Week 4 — Infrastructure & Intelligence
March 22–24, 2026Added
- Browser-based Claude Code terminal on EKS with ttyd + reverse proxy #162
- Ephemeral Claude Code containers with git persistence AB#127
- IRSA-based CronJob for cost reports with rich email templates #161
- Prompt-enhancer: 28 anti-patterns, 7 templates, per-model optimization (Claude/GPT-4o/o3/Gemini) #163
- Automated agent sync between Claude Code and OpenCode runtimes
/specifycommand — pre-PRD requirement clarification with structured decomposition and Gherkin generation #177- ADR-003: spec-kit evaluation — skip tool, cherry-pick Phase 1 patterns #177
Changed
- Prompt-enhancer agent upgraded from stub to full 4-phase pipeline (v1.0 → v2.0)
- Master presentation: updated prompt-enhancer card, added changelog slide
- SDLC orchestrator: wired
acceptance-criteria-testerinto Phase 1→2 gate for BDD enforcement #177 - Phase 1 agent count: 6 → 7 (added acceptance-criteria-tester to portfolio) #177
Week 3 — Enterprise & Admin
March 20–21, 2026Added
- Blaze Admin UI — 5 admin views + data-driven cost report #133
- Cascading config engine, onboarding wizard, platform settings UI AB#126
- Production credentials management AB#128
- Session Management API — 8 endpoints with OpenAPI 3.0 spec #102
- Session recording pipeline + playback UI + CDD evidence #106
- Per-session cost tracking and aggregate dashboard #105
- Agent selection, activity monitoring, SDLC phase visibility #104
- Terminal UI with xterm.js, multi-session tabs, sanitizer #103
- Bi-directional ADO ↔ GitHub PR linking + state sync #125
- K8s console auth Worker + read-only API proxy #87, #91
- CF Workers standardization, cross-subdomain SSO #160
- AWS cost optimization R3–R7: single NAT, log retention, off-hours scaling #157
- EKS Terraform configs with IRSA and cost controls #98
- Process concurrency guard and watchdog hook #134
- ADR-001: Anthropic plugins — adopt LSPs + security hook #83
- ADR-002: claude-kit — scanner, practices, health score #89
Changed
- Sprint 2: Enterprise blockers — SSO config, wizard validation, filters #61
- Sprint 3: Compliance hardening — 8-vertical coverage #62
- Sprint 6: Commercial readiness #66
- Web UI domain migration to accelerator-demo.com #146
- Backlog completion: billing API, SOC2 prep, custom tools AB#37-39
- 99% Python + 95% JS test coverage #91
- CLAUDE.md rewrite + PM tool migration to Azure DevOps #86
Fixed
- P0 remediation: 9 CRITICAL audit findings #84
- P1 remediation: 5 CRITICAL + HIGH security findings #85
- EKS cluster security hardening — pentest remediation #88
- PII removal from source code and config files #72
- Pre-commit fail-closed with bypass detection #75
- Agent registry paths and opencode.json defaults #76
Week 2 — Cloud Platform & Migration
March 16–19, 2026Added
- Blaze Cloud Platform — Managed K8s Developer Environments #54
- SDLC technical deep-dive presentation #55
- 8090.ai competitive analysis and platform code audit #60
- Agentic SDLC asset migration to Blaze platform #53
- Remaining capabilities migration from legacy Helix #56
Changed
- Complete migration from Helix platform to Blaze canonical form
- Dual-runtime support: OpenCode + Claude Code
Week 1 — Platform Launch
March 4–10, 2026Added
- Initial Blaze agentic SDLC platform on OpenCode framework #41
- Canonical artifact registry for dual-runtime agents
- Gap analysis presentation with Cloudflare OTP deployment #41
- Competitive landscape & market opportunity analysis #42
- Agent modals, platform components, BPMN capabilities #43
- Architecture visuals redesign with CLAUDE.md #45
- 12-agent comprehensive code audit command
- ADO manager with PRD-driven agent
- Git hooks via .githooks with pre-push protection #44, #52
Changed
- Migrated from legacy Helix naming to Blaze
- OpenCode config hardened for production loading
- All legacy Claude Code references removed
Fixed
- OpenCode plugin crash from blaze-registry path #46
- Plugin audit findings — extract, harden, test #49
- Agent frontmatter mode: subagent restoration
Dual-Runtime Sync: All agent changes are automatically validated across OpenCode (.opencode/agents/) and Claude Code (.claude/agents/) via pre-commit hook. Canonical source is .opencode/agents/ — Claude Code agents are auto-synced on every commit.
Design Partner Program
We are accepting a limited cohort of design partners to co-build Blaze into the governance platform their teams need. Design partners get early access, influence over the roadmap, and preferential pricing in exchange for structured feedback.
What Design Partners Get
- Full Professional tier access at no cost during POC
- Direct access to engineering team (weekly syncs)
- Priority feature development based on your needs
- Locked-in pricing at 50% of launch price
- Co-authorship credit on case study
- Early access to Enterprise features
- Custom agent development (2 agents included)
How to Get Started
- Schedule a 30-minute technical discovery call to assess fit and platform requirements
- Receive a customized Blaze POC environment configured for your stack and compliance framework
- Run a 2-week governed sprint with your team using Blaze agents alongside your existing AI tools
- Review evidence dashboard, compliance score, and cost impact with our team
- Sign design partner agreement and begin full integration with roadmap influence rights
design-partners@accelerator-demo.com
GitHub
github.com/accelerator-demo/blaze
Platform
sla.accelerator-demo.com
Blaze: Write agents once. Govern everywhere. Prove compliance automatically.
Multi-tenant · Dual-platform · Evidence-driven · Built for enterprise