The on-premises AI copilot for sysadmins. Describe what you need in plain language. Inultus generates PyInfra code, tests it, and waits for your approval. Your data never leaves your network.
Non inultus premor
I am not injured unavenged.
30+
French hospitals hit by ransomware in 2022-2023
20%
of hospital servers run obsolete, unpatched systems
150+
hours/month on manual vulnerability management
3x
increase in vulnerability exploitation as initial access vector
30+ French hospitals hit by ransomware in 2 years. 20% of hospital servers run obsolete systems. Your team spends 150h/month on manual patching instead of securing the fleet.
60% of breaches trace to a known, unpatched vulnerability. Vulnerability exploitation as initial access tripled in one year. Every delay is a window for attackers.
Claude Code and Cursor shell out to bash. They run arbitrary commands. One hallucinated rm -rf and the business is down. No sysadmin trusts an AI with raw SSH to production.
Give AI full root (unacceptable) or do everything by hand (unsustainable). There is no AI that generates tested, auditable code and lets a human review it before execution.
Government agencies, banks, hospitals cannot send fleet data to a SaaS vendor. NIS2, DORA, HDS, RGPD: compliance deadlines are here. 86% of CIOs plan to repatriate workloads on-premises. Existing AI tools are cloud-only.
Ask your fleet anything. Describe what you need. Inultus writes the PyInfra code, tests it, and waits for your approval.
Query your infrastructure in plain language. Inultus collects PyInfra facts across your fleet and returns structured data: OS versions, installed packages, running services, kernel versions, open ports.
"Are my servers compliant with CIS benchmarks?" Inultus audits the fleet, identifies gaps, and generates hardening code adapted to each target.
Inultus generates real PyInfra hardening code for each non-compliant host. The code is tested in a Docker sandbox before you ever see it. Syntax, idempotency, and target validation, all checked.
You review real PyInfra code, not a summary. Color-coded risk, affected hosts, every operation visible. Execution runs as an isolated Docker container. Full logs, fully auditable.
Your data stays on your network. The AI stays on a leash.
Fleet data NEVER leaves.
Only inference calls. No data stored.
Custom Qwen model runs on-premises. Nothing leaves the network. Zero external dependencies.
"Non inultus premor" — Motto of Nancy, Lorraine, since 1477.
We do not wrap PyInfra, we shape it. Direct influence on the fact/operation API roadmap. This is not a "we use open source" story. This is a "we ARE the open source" story.
The AI writes code, not commands. The code is tested in a sandbox. A human reads the actual code and approves. No raw SSH, no arbitrary execution, no surprises.
Cloud AI tools opened the market. But banks, hospitals, and government cannot use them. Their data cannot leave their network. We serve the customers they cannot.
Every operation runs in an isolated Docker container. Full logs saved and auditable. No side effects on the Inultus host.
Web chat dashboard for teams. CLI for automation and scripting. SSO authentication. PocketBase backend. Same engine, same logs.
Nothing installed on target servers. Zero attack surface on managed hosts. Works with any server reachable via SSH: bare metal, VMs, multi-cloud.
Large organizations that answer to regulators, not VCs.
Ministries, agencies, territorial authorities. Sovereignty, on-premises mandates.
Banking, insurance, healthcare, energy, telecom. Audit trails, compliance, change control.
OIV/OSE in France, KRITIS in Germany. Air-gapped networks, zero external dependencies.
Large MSPs operating multi-tenant fleets for institutional clients.
Founder & CTO
Built Jinn, the predecessor serving enterprise clients in the Gulf: government, fintech, healthcare. 500+ servers managed.
HQ
Nancy, Lorraine, France
Born in the city of the thistle.
See Inultus patch, harden, and report on a live fleet in 15 minutes.
Schedule a democontact@inultus.com