Cloud agent defense. One URL change.
Route your AI agent traffic through Vigil Gateway. Four-model detection, deterministic policy enforcement, cryptographic audit, and TAP-issued agent identity. Zero install on your servers. Same engine as the desktop app.
// Before
const client = new OpenAI({
baseURL: "https://api.openai.com/v1",
apiKey: process.env.OPENAI_API_KEY
});
// After
const client = new OpenAI({
baseURL: "https://gateway.runvigil.ai/v1/openai",
apiKey: process.env.OPENAI_API_KEY,
defaultHeaders: {
"X-Vigil-Key": process.env.VIGIL_KEY
}
});
// Full coverage. Zero refactor.Three minutes. Three steps. Full defense.
Gateway is a drop-in. Point your SDK at gateway.runvigil.ai instead of the provider. We proxy, inspect, enforce, audit, and forward. Upstream response streams back unchanged when clean. Gets held when not.
# Python (OpenAI SDK)
client = OpenAI(base_url="https://api.openai.com/v1")
client = OpenAI(
base_url="https://gateway.runvigil.ai/v1/openai",
default_headers={"X-Vigil-Key": VIGIL_KEY}
)
# Python (Anthropic SDK)
client = Anthropic(
base_url="https://gateway.runvigil.ai/v1/anthropic",
default_headers={"X-Vigil-Key": VIGIL_KEY}
)
# Go (Groq, via HTTP client)
req.Header.Set("X-Vigil-Key", vigilKey)
req.URL = "https://gateway.runvigil.ai/v1/groq/chat/completions"
# curl (Google Gemini)
curl https://gateway.runvigil.ai/v1/google/v1beta/models/gemini-pro:generateContent \
-H "X-Vigil-Key: $VIGIL_KEY" \
-H "x-goog-api-key: $GOOGLE_KEY"What gets included at the URL swap.
Gateway runs the same engine as the desktop app. These are the capabilities you get for free, out of the box, on every request.
Four tiers. One engine. Scale as your agents do.
Consumer Citadel and Sovereign plans include Gateway quota for your own cloud agents. Developer and above buy scale. Enterprise buys SLA and SOC 2.
- VolumeUp to 100k requests / month
- ProvidersOpenAI, Anthropic, Google, Groq
- PolicyYour Citadel/Sovereign policy applies
- SupportCommunity forum
- Volume1M requests / month
- KeysSingle project key
- DashboardFull Gateway console
- PolicyCustom policy rules
- SupportCommunity + email
- Volume10M requests / month
- KeysMultiple projects, SSO
- PolicyShared team policies
- AuditVOAF export + SIEM
- SupportEmail, 24h response
- VolumeUnlimited, custom SLA
- DeploySelf-hosted option
- SecuritySOC 2, SSO/SCIM, SIEM
- ProtocolFull TAP / VARP / VOAF
- SupportDedicated success manager
Native support. Framework-first.
Gateway works with any SDK that lets you override the base URL. We are also shipping first-class integrations with the frameworks most agents are written in.
Every agent gets a verifiable identity.
Gateway issues a Trust Attestation Protocol certificate to every agent that routes through it. The certificate declares what the agent is, what it can do, and who vouches for it.
When an agent gets compromised, a single VARP call revokes the certificate and cascades the revocation across every queued action across every surface. No more chasing down leaked access tokens manually.
Every request generates a VOAF record. SHA-256 chained. Third-party verifiable with the open-source vigil-verify CLI. You own the audit trail.
Read the spec →stripe.read
The honest answers.
Does Gateway see my prompts?
What is the latency overhead?
What happens if Gateway goes down?
Which providers are supported?
How does Gateway compare to Cloudflare AI Gateway or Portkey?
Is there an open-source version?
Cover your agents before they cover for you.
The agent economy is shipping. The defense layer is not. Put your cloud traffic through Gateway today and take the next 15 minutes off your threat surface forever.