Architecture comparison

VaultCrux vs typical RAG

A standard RAG stack is optimized for speed of setup. VaultCrux is optimized for evidence quality, control, and auditability.

The typical RAG-as-a-Service stack

In market research across platforms such as Orq.ai, Nuclia, Stack AI, and open-source frameworks like LlamaIndex, Haystack, and Verba, the common deployment shape is intentionally simple.

Core architecture

  • Three components: API server, vector database, and LLM provider connection.
  • Optional web UI on top.
  • Standard flow: ingest, chunk, embed, retrieve context, and answer.

Operating footprint

  • Single-cloud deployment with API plus managed vector store.
  • Usually Postgres for user accounts and a reverse proxy.
  • Often two to three servers run comfortably by one team.

What VaultCrux actually runs

VaultCrux is built as an evidence and control plane, not only a retrieval API. The as-built production topology and software layers are materially deeper.

  • Four dedicated hosts: app (API + MCP + workers + Frontdoor), data (Postgres + pgvector + Qdrant), ops (Prometheus + Alertmanager + Grafana + OpsLite), and dedicated HashiCorp Vault (Raft + Transit signing), connected through Tailscale.
  • Four-layer retrieval pipeline: hybrid BM25+ANN candidate generation, lane-aware late fusion across four embedding lanes (768 -> 1024 -> 1536 -> 3072), meaning control via priors and receipt-normalized anchoring, and reranking.

Receipts and governance

  • CROWN receipts (BLAKE3 hashing + ed25519 Transit signing + append-only provenance ledger).
  • Shield capability firewall with 9 policy stages.
  • WatchCrux independent audit layer and chunk-level evidence mapping.

Runtime economics and identity

  • Ledgered credit mint/spend economy.
  • MCP tool inventory (25+ tools across 6 service lines).
  • Agent principal/sponsor separation with budget-capped tokens and multi-seat RBAC provisioning.