Chain of custody
Five specialized agents.
One linear assembly line.
Each agent has a specific job and strict constraints on what it can access. Click an agent to see its role in detail
THE CRITICAL CONSTRAINT
The Writer Agent is forbidden from accessing the internet. It can only synthesize evidence that has already been verified by the upstream agents.
The Architect
"What do we need to prove?"
Analyzes the OSW (Objective, Scope, Watchouts) and breaks down high-level objectives into specific, verifiable hypotheses. Translates business questions into scientific claims that can be tested against evidence.
RECEIVES
OSW Document, Strategic Context
PASSES FORWARD
Candidate Statements, Key Intelligence Questions
The Researcher
"Find everything on this topic."
Executes comprehensive searches across academic databases, clinical trial registries, and regulatory sources. Builds the raw Search Index that contains every potentially relevant source.
RECEIVES
Candidate Statements, Search Parameters
PASSES FORWARD
Raw Search Index (DOIs, PMIDs, NCT IDs)
CONSTRAINT
Can only search sources defined in scope. Cannot modify the hypotheses.
The Auditor
"Does this source prove the claim?"
Reads source documents and evaluates whether they actually support the candidate statements. Applies PICO structuring to ensure precise matching. Assigns verification status.
RECEIVES
Candidate Statements, Raw Search Index
PASSES FORWARD
Statement–Evidence Mappings, Verification Status
CONSTRAINT
Can only read sources in the Index. Cannot search for new sources.
The Curator
"Is this evidence strong enough?"
Applies evidence hierarchy rules to filter and prioritize sources. Ensures the final Evidence Library contains only high-quality, relevant citations.
RECEIVES
Statement–Evidence Mappings, Hierarchy Rules
PASSES FORWARD
Curated Evidence Library
CONSTRAINT
Cannot override Auditor verification status. Can only rank and filter.
The Writer
"Synthesize the verified facts."
Assembles the narrative from verified evidence. Applies language neutralization. Generates the AI Narrative Foundation with full traceability.
RECEIVES
Curated Evidence Library, Document Structure
PASSES FORWARD
AI Narrative Foundation, Reasoning Trace
CONSTRAINT
Cannot access the internet. Can only use evidence from the Curator's Library.
PLATFORM ARCHITECTURE
Three questions that govern every engagement
The platform operates on a "Closed Loop" architecture governed by three critical questions. If we cannot answer "Yes" to each, we do not proceed to the next step.
Question 1
Is the OSW complete?
Question 2
Is the index accurate?
Question 3
Are citations correct?
Strategic Memory
Your context persists
Context that compounds
Unlike session-based chatbots, Posteros maintains persistent strategic context. Your imperatives, competitive landscape, and Watchouts are stored in a relational database and enforced across future work.
When you tell us "never generalize class effects" in Month 1, that constraint is still enforced in Month 6-even if a different team member is running the pipeline.
- Do not generalize class effects to our specific molecule.
- Avoid direct comparative claims without head-to-head data.
- Flag any off-label implications for manual review.
What persists
Strategic imperatives
Your high-level objectives and positioning goals.
Competitor profiles
Detailed analysis of competitive positioning.
Evidence library
Curated, verified sources that grow over time.
Watchouts
Hard constraints on what the Al cannot do.
PLATFORM ARCHITECTURE
Three layers-full control
Every task is fully specified-from data source to output schema. Nothing is a black box.
Pipeline & task orchestration
Configurable engine that sequences complex, multi-step workflows.
Declarative task definitions with dependencies.
Parallel execution with configurable thread pools.
Complete execution logging for every LLM call.
Automatic error handling and retry logic.
Prompt management layer
Centralized control over all LLM interactions with full versioning.
Versioned prompts with A/B testing capability.
Per-task model and temperature configuration.
Structured output enforcement via JSON schema.
Search grounding controls for each task.
Unified data architecture
Relational model that reflects business logic, not just data storage.
70+ tables with semantic relationships.
JSON columns for complex nested structures.
Bi-directional traceability throughout.
Complete audit history for compliance.
SECURITY & COMPLIANCE
Enterprise-grade; Audit-ready
Data isolation
Client data is logically isolated. Your intelligence never trains external models or mixes with other clients.
Enterprise infrastructure
Hosted on Oracle Cloud Infrastructure designed to meet SOC 2 standards. Enterprise-grade security controls.
Comprehensive audit trail
Every LLM call logged with input, output, tokens, and timing. Full traceability for compliance review.
Reproducibility
Deterministic pipelines with versioned prompts and configurations. Re-run workflows with versioned prompts and configurations.
See what the architecture produces
The Glass Box architecture enables verification capabilities that general-purpose Al cannot match: explicit verification status, PICO structuring, evidence hierarchy, and bi-directional traceability.

core architectural principle