The Problem: AI Agents Are Under Attack
AI agents are not just chat interfaces. They execute code, access databases, call APIs, and make autonomous decisions. Every one of these capabilities is an attack surface.77%
of LLM applications are vulnerable to prompt injection (OWASP 2024)
$4.2M
average cost of an AI-related data breach (IBM 2024)
0.3s
time from successful injection to data exfiltration
- Indirect injection via retrieved documents poisons RAG systems
- Multi-step jailbreaks bypass single-turn guardrails
- Encoded payloads (Base64, leetspeak) evade naive filters
- Tool manipulation turns your agent into an attacker’s weapon
Why Not Build It Yourself?
Building robust AI security seems straightforward until you try it.Detection rules take 6+ months to develop
Detection rules take 6+ months to develop
RAXE’s 515+ rules were developed by security researchers who analyzed thousands of real-world attacks. Each rule is tuned for precision (low false positives) and recall (catches variants). Building this from scratch means:
- Collecting attack datasets (where do you find real jailbreaks?)
- Writing and tuning regex patterns that catch variants but not benign text
- Testing against production traffic to measure false positive rates
- Iterating for months until acceptable
Attackers evolve faster than you can respond
Attackers evolve faster than you can respond
New jailbreak techniques appear weekly. The AI security landscape moves fast:
- New persona attacks (DAN, DUDE, AIM) emerge constantly
- Encoding techniques evolve (ROT13, Base64, Unicode homoglyphs)
- Multi-step attacks chain innocuous prompts into exploits
ML models need specialized training data
ML models need specialized training data
RAXE’s L2 classifier is trained on curated attack datasets that include:
- 14 threat families with real-world examples
- 35 attack techniques with labeled samples
- Adversarial examples designed to evade detection
Privacy is hard to get right
Privacy is hard to get right
Sending prompts to a cloud API for security scanning defeats the purpose if that API is compromised. RAXE runs 100% on-device:
- No prompt data ever leaves your infrastructure
- No network calls during scanning
- Works in air-gapped environments
RAXE vs. Cloud Security Solutions
Many AI security products require sending your prompts to their cloud for analysis. Here’s how RAXE compares:| Feature | RAXE | Cloud-Only Solutions |
|---|---|---|
| Privacy | 100% local - prompts never leave your infrastructure | Prompts sent to third-party cloud |
| Latency | ~3ms (L1) / ~10ms (L1+L2) | 100-500ms network round-trip |
| Cost | Free (Community Edition) / Predictable pricing | Per-API-call pricing adds up fast |
| Offline | Works without internet | Requires constant connectivity |
| Compliance | GDPR/HIPAA/SOC 2 friendly - no data residency concerns | Data residency and processing agreements required |
| Reliability | No external dependencies | Outages affect your production |
| Air-gapped | Works in isolated environments | Not possible |
- Privacy Matters
- Latency Matters
- Cost Matters
Your prompts contain sensitive data. User queries, business logic, customer information - all flow through your AI agent. Sending this to a third-party API for security scanning creates a new attack surface.RAXE runs 100% on-device:
- ML model executes locally (no cloud inference)
- Rule matching happens in-process
- Only anonymized telemetry (prompt hash, rule IDs) is sent - never content
What RAXE Detects
RAXE’s dual-layer detection engine catches both known and novel threats:Prompt Injection (PI)
Attempts to override system instructions or hijack agent behavior.Example Attacks
RAXE detects 59+ prompt injection patterns including indirect injection via retrieved content.
Jailbreaks (JB)
Persona manipulation to bypass safety guidelines.Example Attacks
RAXE detects 77+ jailbreak patterns including multi-turn and encoded variants.
Data Exfiltration (DE)
Attempts to steal sensitive information from your system.Example Attacks
RAXE detects data exfiltration attempts targeting memory, tools, and responses.
Encoded Attacks (ENC)
Obfuscation techniques designed to evade detection.Example Attacks
RAXE detects 70+ encoding/obfuscation techniques including mixed-encoding attacks.
Tool Manipulation (TOOL)
Attempts to misuse agent tools for malicious purposes.Example Attacks
RAXE’s agentic scanning validates tool chains and detects dangerous operations.
Agent Goal Hijacking (AGENT)
Attempts to redirect the agent’s objective.Example Attacks
RAXE’s
validate_goal_change() detects objective manipulation in real-time.Who Uses RAXE?
Startups Building AI Products
Ship secure AI features without hiring a security team. RAXE provides enterprise-grade detection in a simple SDK.Use case: Protecting customer-facing chatbots and AI assistants
Enterprise Security Teams
Meet compliance requirements while enabling AI innovation. RAXE’s SIEM integrations provide visibility into AI threats.Use case: SOC monitoring of LLM deployments across the organization
AI/ML Engineers
Focus on building agents, not writing security rules. RAXE integrates in 2 lines of code.Use case: Adding guardrails to LangChain, CrewAI, and AutoGen agents
MSSPs and Security Providers
Offer AI security as a service to your customers. RAXE’s multi-tenant architecture supports per-customer configuration.Use case: Managed AI security for multiple customer deployments
The RAXE Advantage
Privacy by Design
100% local processing. Your prompts never leave your infrastructure. No cloud dependency, no data residency concerns.
Sub-10ms Latency
Real-time protection that doesn’t slow down your agents. L1 pattern matching in ~3ms, full ML scan in ~10ms.
515+ Detection Rules
Developed by security researchers. Covering 11 threat families including 4 agentic-specific families.
Dual-Layer Detection
L1 (regex) catches known attacks fast. L2 (ML) catches novel and obfuscated threats.
Get Started in 60 Seconds
Quick Start Guide
Protect your first agent in 60 seconds
Integration Guides
LangChain, CrewAI, AutoGen, MCP + more
Frequently Asked Questions
Is RAXE really free?
Is RAXE really free?
Yes. RAXE Community Edition is free and open source. No usage limits, no feature gates, no trial periods. Use it in production without paying anything.
Does RAXE slow down my application?
Does RAXE slow down my application?
No. RAXE adds ~3ms for L1 pattern matching and ~10ms for full L1+L2 scanning. This is imperceptible to users and far faster than cloud alternatives (100-500ms).
What data does RAXE collect?
What data does RAXE collect?
RAXE collects only anonymized telemetry: prompt hashes (not content), rule IDs that matched, scan latency. Your actual prompts never leave your infrastructure. Telemetry can be fully disabled.
How do I update detection rules?
How do I update detection rules?
Rules update automatically with new RAXE versions (
pip install --upgrade raxe). You can also add custom rules for your specific use cases.Can RAXE work in air-gapped environments?
Can RAXE work in air-gapped environments?
Yes. RAXE runs 100% locally with no internet required. ML models are bundled with the package and rule updates can be applied manually.
Have more questions? Join our Slack community or open an issue on GitHub.
