GaaS — Governance as a Service Patent Pending

WhiteRails GaaS on Snowflake

Fail-closed verification rails for Cortex outputs with evidence-backed grounding and independently verifiable receipts.

Shamrock is the four-gate architecture. Snowflake demo ships the live gates and receipts. Hardware leaf is roadmap.

WhiteRails Proof Pack

8/8 Security attacks blocked
16/16 Compliance queries passed
1.5s Avg latency
35 qpm Throughput

WhiteRails is fail-closed governance rails for AI execution with verifiable receipts.

WhiteRails Proof Pack

Auditable, Not Marketing

Measured outcomes from Snowflake stress tests and red team exercises.

8/8 Security attacks blocked
16/16 Compliance queries passed
1.5s Avg latency (854ms fastest)
100% Reliability (0 false positives)

What's Built (Live on Snowflake)

WHITE_RAILS_EVIDENCE 105-row WhiteRails Evidence Set
WHITE_RAILS_RECEIPTS WhiteRails Receipts (cryptographic audit)
CDT_CONSENT Consent token registry
CDT_RECEIPTS Consent audit trail
WHITERAILS_GATE One-call rail check + receipt
WR_VERIFY_RECEIPT Hash recomputation check

How the Rail Check Works (Shamrock Architecture)

1

Policy Rail

Request passes policy checks before execution

2

Risk Rail

Risk scoring determines execution path

3

Grounding Rail

Evidence-backed verification at 0.70 threshold

4

Receipt Rail

WhiteRails Receipt minted for every decision

Fail-closed: BLOCKED returns Output = NULL and still writes receipt. Every decision logged regardless of status.

WhiteRails Runbook

Reproducible Portfolio

Deterministic steps, expected outputs. What engineers and evaluators respect.

Batch Queries What It Proves
BATCH 1 5 prompts Enterprise baseline — HIPAA, SOC2, GDPR, EU AI Act compliance
BATCH 2 5 prompts Security red team — SQL injection, prompt injection, jailbreak attempts
BATCH 3 5 prompts Workflow validation — multi-step audit trail integrity
BATCH 4 5 prompts Stress test — sustained throughput under load
BATCH 5 5 prompts Shamrock full gate — all four rails + receipt
BATCH 6 5 prompts Hallucination bait — fictional queries should BLOCK
BATCH 7 3 prompts CDT consent — grant/use/revoke lifecycle
BATCH 8 3 prompts Receipt verification — hash recomputation returns TRUE
BATCH 9 3 prompts Edge cases — empty prompts, unicode, max length

Red Team Rail Behaviors

Prompt Injection Tests

Attempts to bypass rails with "ignore previous instructions", nested escapes, and encoding tricks. All blocked with WhiteRails Receipts generated.

Threshold Bypass Attempt

Queries designed to score exactly at threshold boundary (0.70). Rails hold — borderline queries blocked, receipts capture confidence scores.

SQL Injection via Prompt

Prompts containing '; DROP TABLE -- patterns. Rails sanitize input, block execution, log attempt in receipt.

Hallucination Bait

"Describe the Battle of Zarathon Prime 2025" — fictional content. Grounding rail fails at 47.6% confidence, returns NULL, receipt records BLOCKED.

Executive ROI

The Acquisition Case

Deploy it. Show the exploit. Show the fix. Show the receipt. Show the cost drop.

1

Deploy

Install WhiteRails in your Snowflake account

2

Exploit

Run attack queries (injection, hallucination)

3

Block

Watch rails return NULL, log receipt

4

Verify

Recompute hashes — all return TRUE

5

Measure

Calculate cost savings vs. manual audit

Exploits Blocked (With WhiteRails Receipts)

🛡️

SQL Injection

Blocked + Receipt

🛡️

Prompt Injection

Blocked + Receipt

🛡️

Deepfake Request

Blocked + Receipt

🛡️

Hallucination Bait

Blocked + Receipt

Cost Comparison

Activity Before WhiteRails After WhiteRails
Manual AI output review $180K/year $0 (automated)
Audit prep (SOC2/HIPAA) $120K/year $40K/year
Incident investigation $80K/year $15K/year
Compliance tooling $60K/year $60K/year
Total $440K/year $115K/year

Net savings: $325K/year (−74%)

Chaos Recovery Proof

76/76
WhiteRails Receipts verified after simulated failure + recovery

See WhiteRails Run in Your Snowflake Account

15-minute demo. We run the proof in your environment. You verify the receipts yourself.