Skip to main content
MULTI-AGENT RUNTIME

Quantitative decision intelligence for energy infrastructure.

Felixfusion is a multi-agent platform for high-stakes capital and regulatory work.

4–6 weeks
Engagement to signed artifact
Customer-VPC
Default deployment
Human-gated
Every external artifact

Built against

  • NEM
  • ERCOT
  • GCC
  • UFLPA
  • IEC 62933
  • UL 9540
  • NFPA 855
  • ICV
  • AS/NZS 4777
  • IEC 61400

How the engine reads the world

Inputs in. Distributions out. Signed artifacts at the gate.

Filings, tenders, specs, contracts come in as document inputs. Athena and Nexus run them through a probabilistic forecast layer with sensitivity bands and provenance, then route every external artifact through a human approval gate before it leaves the system.

INPUTS· DOCUMENT SURFACEFILINGTENDERSPECCONTRACTQUANTITATIVE DECISION INTELLIGENCEforecast distribution · sensitivity bands · provenancedP50$ 78MNPVIRR22%DEGRADATION-ADJP90$ 49MSTRESS BANDGATE5/5HUMAN-SIGNEDOUTPUTS· HUMAN-GATED · AUDIT-LOGGEDIC MEMOSIGNEDAWARD MEMOSIGNEDCOMPLIANCESIGNEDDD PACKSIGNED

Decision surfaces

Five surfaces, one engine. Built for forward-looking risk.

Governance

Every claim provenanced. Every artifact human-signed.

Read more

Audit trail

Append-only by default

Every agent generation, every human review, every approval, every revision is written to an append-only audit log. Exportable in a structured format suitable for external review.

Read more

Human gate

No artifact ships without sign-off

Every external artifact (DD pack, IC memo, compliance brief, redline, award memo) is held until a senior-analyst or procurement-lead signature lands.

Read more

Provenance

Trace any sentence to its source

A reviewer can open any sentence in any draft and trace it back to the specific page, table, or row in the source material. We are not running an opaque-embedding stack.

Read more

Deployment

Customer-VPC is the default

When deployed inside the buyer's VPC, no source documents, derived artifacts, or audit logs leave that account. The buyer holds the keys, the buyer holds the logs, the buyer can revoke access without our involvement.