app.py
See It Work
Try it yourself — this runs 100% on your machine:What RAXE Protects Against
| Threat | What Happens | RAXE Response |
|---|---|---|
| Prompt Injection | Attacker overrides your system prompt | Blocked before LLM sees it |
| Jailbreaks | User bypasses safety guidelines | Detected via ML + 77 rules |
| Agent Hijacking | Goals or tools get manipulated | Agentic scanning methods |
| Data Exfiltration | PII or secrets leak through prompts | 112 PII detection rules |
Integrations
- Agent Frameworks
- LLM Providers
- Enterprise
How Detection Works
How Detection Works
RAXE uses a dual-layer architecture:L1 (Rules): 514+ regex patterns across 11 threat families. Sub-millisecond latency. Catches known attack signatures.L2 (ML): 5-head neural classifier running 100% on-device via ONNX. Catches obfuscated attacks, novel patterns, and semantic threats that bypass regex.Full detection engine docs
Performance
L1 Latency
~1ms
Full Scan
~10ms
Rules
514+
Threat Families
11
