API Security · MCP Security · AI Gateway · Verification Engine — unified by a single correlation ID propagated end-to-end.
Most stacks bolt four separate vendors together and lose the thread between them. G8KEPR is one platform with one correlation ID — a threat detected at the MCP layer traces back to the originating user request and forward to the API response. That is architecturally impossible without shared infrastructure.
Everything you need to secure APIs and AI applications
5-tier detection · 1,524 patterns · OWASP 10/10/10
A 5-tier ML detection pipeline (regex → embeddings → NLI → LLM → behavioral) with 100% precision on the CI-gated test corpus. Catches what signature-based WAFs miss.
7-step pipeline · OS-level sandbox · rug-pull detect
The only MCP security platform with OS-level sandboxing (RLIMIT_*, capability dropping) and SHA-256 rug-pull detection on every tool definition. Neither is mandated by the MCP spec.
15+ providers · auto prompt caching · adaptive breaker
One API across 15+ providers (incl. BYOI custom). Auto-injects Anthropic prompt caching for 88% savings at 10 calls. Adaptive Z-score circuit breaker beats Hystrix-style static thresholds. BYOK with AES-256-GCM.
4 layers · BLOCK-capable · SUGGEST action
Most AI guardrails detect-and-alert after bad output ships. G8KEPR is BLOCK-capable at middleware position 14 — four independent layers, six explicit failure modes, and a SUGGEST action that returns a compliant alternative instead of just an error.
Plugin marketplace for extending G8KEPR with community-contributed integrations — not yet shipped. The four pillars above are live today.
A single AI-assisted request traverses every pillar in sequence, sharing one correlation ID end-to-end. A threat detected at the MCP layer traces back to the originating user request and forward to the API response.
Five capabilities that exist in the platform — not in any competing API gateway, AI guardrail, or LLM proxy. Each ships in production today.
RLIMIT_CPU/AS/NOFILE/NPROC, setsid() process-group isolation, Linux capability dropping, two-stage SIGTERM→SIGKILL. The MCP spec mandates none of this.
modules/mcp/sandbox/executor.pyRug-pull detection. Tool definitions hashed at tools/list time, re-verified on every tools/call. Mid-session mutation blocked with a CRITICAL event.
modules/mcp/tool_registry.pyStatistical baselines per provider per hour-of-day, not static thresholds. Progressive recovery 10/25/50/100%. More resilient than Hystrix or Resilience4j.
gateway/router.pyEvery event across API → Gateway → MCP → Verification shares one correlation ID. End-to-end forensics from a single query — impossible with separate vendor stacks.
shared correlation_idSHA-256 chain where each entry signs the previous. Three verification levels (full, single, last-N). Tamper-evident evidence for SOC 2 CC7.2, HIPAA §164.312(b), FedRAMP AU-9.
genesis SHA-256 blockWe complement Kong, Apigee, and AWS — we don't replace them
| Feature | G8KEPR | Kong / Apigee | AWS WAF |
|---|---|---|---|
| OWASP Top 10 (Web · API · LLM) — 10/10/10 | |||
| 5-tier ML detection (regex → embeddings → NLI → LLM → behavioral) | — | — | |
| MCP rug-pull detection (SHA-256 tool-definition registry) | — | — | |
| OS-level sandbox for MCP tool execution | — | — | |
| Multi-LLM routing across 15+ providers | — | — | |
| Automatic Anthropic prompt caching (88% at 10 calls) | — | — | |
| Adaptive Z-score circuit breaker (vs static thresholds) | — | — | |
| 4-layer output verification with SUGGEST action | — | — | |
| Cross-pillar correlation ID (one ID, end-to-end) | — | — | |
| EU AI Act risk-class header on every completion | — | — | |
| Hash-chain audit (tamper-evident, SOC 2 / FedRAMP-aligned) | — | — | |
| Works alongside existing gateways (no replacement needed) | — |
G8KEPR is designed to work alongside your existing infrastructure.
Use Kong for routing, G8KEPR for AI-specific security.
Common questions about the G8KEPR platform
Need help choosing the right features?
Talk to our solutions team →Every pillar writes per-request evidence into a SHA-256 hash chain. Mappings to 14 compliance frameworks are pre-built. Subject to independent audit and attestation — G8KEPR provides the technical controls and evidence; your auditor issues the certification.
Four pillars, one correlation ID, hash-chain audit, and 2,000+ mapped controls across 14 compliance frameworks — without changing a line of your application code.
No credit card required • 30-day free trial • Cancel anytime