A framework for

The Stack

Six foundational layers. Zero external ML dependencies. Complete sovereignty.

SLEET Runtime

29-opcode virtual machine with precise resource accounting. Ephemeral theatres execute untrusted reasoning, destroyed upon completion. Cranelift-backed JIT for hot paths.

STELE Cognitive Core

Hand-implemented neural networks with no PyTorch or TensorFlow. Multi-tier memory mimicking human cognition: episodic, semantic, and short-term systems with priority-weighted sampling.

Built for Sovereignty

Your data, your rules. Privacy by design, not by promise.

Local-First Execution

Your Thinking System node resides on your hardware, acting as a fiduciary agent. No cloud synchronisation, no training on your data, no third-party access.

Verifiable Credentials

W3C-compatible credential issuance with Ed25519 signatures. Your reputation is earned through verifiable action, not assigned by platforms.

Autonomous Code Synthesis

Generate, validate, and self-heal code from natural language specifications. The system iterates until tests pass.

Structured Memory

Multi-tier memory with episodic, semantic, and short-term layers. All data carries bitemporal timestamps and provenance.

Declarative Workflows

Define reasoning patterns as Flows—graphs of semantic blocks transpiled to deterministic bytecode.

Policy-Governed Persistence

Only trusted Scribes can commit to long-term storage, each evaluating requests against programmable policies.

Peer-to-Peer Network

The GTR-Fabric routes tasks via geodesic traversal—always the shortest path. Dynamic pricing adapts to network health in real time.

Proof of Performance Staking

PoPS selects nodes for tasks based on historical performance, cryptographic reputation endorsements, and committed stake. Merit over politics.

Built on proven architecture.

About Thunk.

The flagship application built on the Thinking System libraries.

Thinking System

Collection of Rust crates: stele (cognitive core), sleet (agent runtime), steel (kernel), estel (interface). The foundation for sovereign AI.

Thunk Application

Reference implementation and cognitive assistant. Autonomous code synthesis, declarative flow execution, and structured memory with provenance.

Why choose Thunk?

Sovereign cognitive architecture built on transparent, auditable foundations.

Sovereignty
No external party can compel behaviour against your policies.
Emergence
Complex intelligence from simple, well-defined components.
Transparency
Every decision recorded with full provenance chain.
Modularity
Extend, replace, or compose without understanding the entire stack.

Your intelligence, your choice.

Agents

Ephemeral, untrusted, task-specific reasoning in sandboxed theatres.

Scribes

Persistent, trusted guardians mediating storage with policy enforcement.

Flows

Declarative reasoning workflows compiled to deterministic bytecode.

Theatres

Gas-metered execution contexts with capability-scoped permissions.

Thunk everywhere.

Join Thunk's growing constellation of builders.

Cognitive Labs
Human Systems
Memory Protocol
Trust Analytics
Sovereign Compute
Privacy Chain
Insight Terminal
Emergent Behaviour
Verifiable AI
Context Labs
Layered Intelligence
Workflow Systems
Reasoning Engine
Universal Knowledge
Organised Chaos
Intelligence Llama
Secure Compute
Distributed Mind

Serious security.

Peace of mind by design.

Memory-Safe Rust

Written in Rust. No garbage collection, no null pointers, no data races. Memory safety guaranteed at compile time.

Local-First Compute

Your data never leaves your machine. Local LLMs, local storage, local inference. Zero-trust fabric with verified credentials.

Cryptographic Provenance

Blake3 content hashing anchors every event. Ed25519 signatures on credentials. QUIC with TLS 1.3 for peer communication.

Event-Sourced Architecture

56 typed event variants with full provenance chains. Every state change is immutable and auditable.

Common Questions