Architecture · Attribution

Inspired by NVIDIA NeMo Guardrails

How SydClaw's three-layer security model and five-rail safety framework draw on NVIDIA's published thinking on agentic AI security, and what we built differently.

The inspiration

NVIDIA's NeMo Guardrails is an open-source toolkit for adding programmable safety rails to conversational AI applications. It was one of the earliest public frameworks to formalise the idea that an LLM-driven application needs separate, composable layers of validation around the model — not just prompt engineering inside it. The NeMo Guardrails project is published by NVIDIA on GitHub and documented publicly.

When we started building SydClaw, two ideas from NVIDIA's published work shaped the architecture: (1) the five-rail framing of input, dialog, execution, retrieval, and output validation as distinct concerns, and (2) the principle that an agentic system must enforce policy at multiple layers — runtime sandbox, privacy router, and intent verification — rather than relying on the model alone to behave correctly.

What we adopted

The five-rail safety model. SydClaw's guard pipeline is structured into five rails that mirror the NeMo Guardrails framing: input rails validate and sanitise the user request, dialog rails control conversation flow and enforce business-context boundaries, execution rails monitor and validate every tool invocation, retrieval rails control which data is accessed during operations, and output rails screen every AI response before delivery. The rails are independently testable and independently configurable per deployment.

The three-layer security pattern. The architecture separates responsibilities into a sandboxed runtime (where AI agent actions execute within policy-controlled boundaries), a privacy router (which strips and tokenises PII before any external API call), and an intent verification layer (which validates every agent action against operator-defined policy before execution). Each layer is a narrow, auditable choke-point — defence in depth, not a single fence.

The principle of programmable safety. Safety rails should be expressed as declarative policy that can be changed without redeploying the model — NVIDIA's published philosophy. SydClaw's policies are configured per-deployment in YAML and per-action in TypeScript, and changes ship without touching the underlying model integration.

What we built differently

Australian compliance frameworks. NeMo Guardrails is jurisdiction-neutral. SydClaw is purpose-built against Australian regulatory frameworks: the Privacy Act 2026 ADM transparency provisions, the NDIS Practice Standards, the strengthened Aged Care Quality Standards, AFSL Best Interests Duty, APRA CPS 234, and TASA 2009. The output rails screen specifically for unlicensed financial advice patterns; the audit rails capture evidence in the format Australian regulators ask for.

Cryptographic audit-trail integrity. We added a SHA-256 hash chain on the audit log so that any tampering after the fact is mathematically detectable. RESTRICTIVE row-level policies prevent UPDATE or DELETE on the audit log even by authenticated database users. This is beyond what NeMo Guardrails provides as a framework — it's a deployment-level control that we needed for the Privacy Act 2026 explainability requirement.

Per-client dedicated infrastructure. NeMo Guardrails is a library you embed in your application. SydClaw is a managed service where each client gets their own Supabase project, their own Vercel deployment, and their own AES-256 encryption keys. The rails run in dedicated infrastructure, not in a shared multi-tenant runtime.

PII tokenisation as a first-class layer. The privacy router runs before any external model call, replacing 17 categories of personal information with reversible tokens. The model never receives raw PII; reverse-mapping happens only inside the client's own infrastructure. NeMo Guardrails supports custom input rails for redaction; SydClaw treats privacy routing as an architectural primitive, not a configurable rail.

Credit and references

NVIDIA NeMo Guardrails is published under the Apache 2.0 licence at github.com/NVIDIA/NeMo-Guardrails. SydClaw does not embed or redistribute the NeMo Guardrails codebase — the inspiration is conceptual: the five-rail safety framing and the principle of programmable, layered safety. The implementation in SydClaw is independent and runs on TypeScript / Node.js, not the Python runtime NeMo Guardrails ships in.

NVIDIA, NeMo, and NeMo Guardrails are trademarks of NVIDIA Corporation. SydClaw is not affiliated with, endorsed by, or sponsored by NVIDIA Corporation.